7f0000002040)='./file0/file0\x00', 0x6002, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) r4 = getpgrp(r2) lseek(0xffffffffffffffff, 0x0, 0xcb7ce17762124e70) perf_event_open(&(0x7f00000043c0)={0x0, 0x70, 0x0, 0x6, 0x5, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000004240)}, 0x44810, 0x3ff, 0x3ff, 0x4, 0x4, 0x200}, r4, 0x9, 0xffffffffffffffff, 0x0) read$FUSE(r3, &(0x7f0000006a00)={0x2020}, 0x100000) 07:56:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x10062) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef015c01000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='dots,dots,nodots,dots,fmask=00000000000000000000001,nodots,nodots,tz=UTC,debug']) 07:56:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) write$FUSE_BMAP(r0, 0x0, 0x0) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000ffffffffffff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01fe01000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000406000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 07:56:40 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x8907, 0x0) 07:56:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00', r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x3, 0x1, 0x0}]}, 0x1c}}, 0x0) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8911, &(0x7f0000000940)={'batadv0\x00'}) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010003000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00', r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x2, 0x0}]}, 0x1c}}, 0x0) 07:56:40 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x3}, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) [ 1656.215491][ T4253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1656.225737][ T4253] nbd: must specify a device to reconfigure 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010005000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001100)='/dev/btrfs-control\x00', 0x0, 0x0) setuid(0xee01) ioctl$MON_IOCX_GETX(r0, 0x4018920a, 0x0) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1656.285011][ T4264] validate_nla: 7 callbacks suppressed [ 1656.285025][ T4264] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 07:56:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7}}, 0x0) 07:56:40 executing program 3: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc0045878, 0x0) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010006000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x107fff, 0x2042) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0x18) write$FUSE_BMAP(r0, &(0x7f0000000440)={0x18}, 0x18) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8941, 0x0) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000402000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0x541b, 0x0) 07:56:40 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000140)) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000f000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010029000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1656.540585][ T36] audit: type=1326 audit(1618214200.780:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4303 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:40 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0xffffffff1fffffa8) 07:56:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:40 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 1657.359113][ T36] audit: type=1326 audit(1618214201.600:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4303 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:41 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x894b, 0x0) 07:56:41 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 07:56:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010040000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:41 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:41 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000940)={'batadv0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) 07:56:41 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:41 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x24, &(0x7f0000002000), 0x8) 07:56:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x4800}, 0x0) 07:56:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01fffe000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:41 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000012000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:41 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r0) 07:56:41 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000406000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:41 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x2d, &(0x7f0000002000), 0x8) 07:56:41 executing program 2: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6000) 07:56:41 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) 07:56:41 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:41 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010002000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc0189436, &(0x7f0000000180)={'batadv0\x00'}) 07:56:41 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) read$FUSE(r0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 07:56:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000040)) 07:56:41 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:41 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000c01b000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010003000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) recvmsg(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x40002000) 07:56:42 executing program 1: pselect6(0x40, &(0x7f0000000200)={0x1}, 0x0, 0x0, 0x0, 0x0) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010005000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 3: syz_emit_ethernet(0x55, &(0x7f00000011c0)=ANY=[@ANYBLOB="bbbbb7bbbbbbffffffffffff4305"], 0x0) 07:56:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000240)={@multicast2, @remote}, 0x8) 07:56:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8910, &(0x7f0000000940)={'batadv0\x00'}) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000025000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010006000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x0) fstat(r0, &(0x7f00000000c0)) 07:56:42 executing program 3: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x80, 0x40000018, 0xffffffffffffffff, 0x0) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8912, &(0x7f0000000940)={'batadv0\x00'}) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000f000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00', r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000320000008"], 0x1c}}, 0x0) 07:56:42 executing program 3: getitimer(0x3f15bc2088f0933, &(0x7f0000000000)) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010029000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000005c000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) 07:56:42 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x28, &(0x7f0000002000), 0x8) [ 1658.078747][ T4439] nbd: must specify a device to reconfigure 07:56:42 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1ff, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/4096, 0x1000) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000d000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100fe000000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000002000), 0x8) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000880000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 1: sched_setaffinity(0xffffffffffffffff, 0x7ffffffff000, 0x0) 07:56:42 executing program 2: fchownat(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0xee00, 0x0, 0x1000) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000001bc0000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010000030000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 1: syz_emit_ethernet(0x1a, &(0x7f0000000000)={@local, @dev, @val={@void}, {@llc={0x4, {@snap={0x0, 0x0, "dc", "b5f8f4"}}}}}, 0x0) 07:56:42 executing program 3: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r0) r1 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6000) shmdt(r1) 07:56:42 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x6, &(0x7f0000002000), 0x8) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100feff0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fdef000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x3c, 0x0) 07:56:42 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) r0 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6000) shmdt(r0) 07:56:42 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000effd000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010044ba1e00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000004c80)='/dev/vcsa#\x00', 0x3, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 07:56:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x9, &(0x7f0000002000), 0x8) 07:56:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffe000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100feffffffe1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5421, &(0x7f0000000940)={'batadv0\x00'}) 07:56:42 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000140)="f3", 0x1, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x0) splice(r2, 0x0, r1, 0x0, 0x40009, 0x0) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1658.593804][ T36] audit: type=1326 audit(1618214202.840:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4507 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0, &(0x7f0000000140)) 07:56:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001020000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x5, &(0x7f0000002000), 0x8) 07:56:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) syz_open_dev$vcsa(&(0x7f0000004c80)='/dev/vcsa#\x00', 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) 07:56:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000feff000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000006c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x40305828, 0x0) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001030000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 3: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x894c, 0x0) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 2: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22242) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001040000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000001020000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 1: syz_emit_ethernet(0xfc0, &(0x7f0000001700)={@remote, @local, @val={@void, {0x8100, 0x0, 0x1}}, {@mpls_mc={0x8848, {[], @ipv6=@gre_packet={0x0, 0x6, "6eaf27", 0xf86, 0x2f, 0x0, @dev, @mcast1, {[], {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0], "6cab14e13716fad164ee6e8f2eeb12592fdfe93eaff1217ac5bd7c54c128b65bcfc4bd76e0223c5a2cc9184cd7f1d099262c8f6159e33528617429a38aea6d41a28e4f2e97e5beb98ace9cac0c27"}, {}, {}, {0x8, 0x6558, 0x0, "eb6bd201508c3511871382c01bf51e67958bea2849a3bcfb43135cba5cb124b67b30fb379592fc3ab903bf9d0c16e9b561a020f418c4f6e7070a41a777bf0f118cb40ffec751b8f92c1e42c47e51a721b568e823af034b3573e04493c0cad8d4e50769295166a028de332fe1757f78d9817afc16c8e3e2bc41bdfd088d62eb28309040b4c832f304c93c03f32f00376eee72dffa240e5f88deabf0a9b1a92da0cb9ef2742f2d104d62b39fe9b357c80c3883b1b2ff412a029e757f3511716890006d7475485fcdb7f8d057e2d6b8"}}}}}}}}, 0x0) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000004000080000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001050000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000025000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 2: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22242) 07:56:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0xf0, 0x0) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001060000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0xc00) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000023d000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 2: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22242) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001070000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 1: syz_emit_ethernet(0x91, 0x0, 0x0) syz_emit_ethernet(0x11, &(0x7f0000000000)={@multicast, @broadcast, @void, {@llc_tr={0x11, {@llc={0x0, 0x0, "12"}}}}}, 0x0) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22242) 07:56:43 executing program 3: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8993, &(0x7f0000000940)={'batadv0\x00'}) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000023e000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001080000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0xf, r0, 0x0) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000007ffff00000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)) getitimer(0x0, &(0x7f0000000540)) 07:56:43 executing program 3: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000940)={'batadv0\x00'}) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001090000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x5f22}}, 0x18) 07:56:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v2={0x0, 0x0, 0x0, 0x0, 0x20, "1521097250f55257c1b148cfa8fee0b0da6788aae88fc87bf87ac94e9e55df69"}, 0x29, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 07:56:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2, 0x0, 0x0, 0x700}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000023f000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x5f22}}, 0x18) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010a0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00', r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {0x5}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 07:56:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x400, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000180)={'batadv0\x00'}) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000040200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x5f22}}, 0x18) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010b0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000006c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x541b, 0x0) 07:56:43 executing program 1: set_mempolicy(0x4, &(0x7f0000000040)=0x7ff, 0x101) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000048000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x5f22}}, 0x18) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010c0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 3: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) shmdt(r0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000004c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:43 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x80) 07:56:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010d0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:43 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000005c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x20000060) 07:56:44 executing program 3: readlinkat(0xffffffffffffffff, &(0x7f0000000040)='\x00', &(0x7f0000000080)=""/61, 0x3d) 07:56:44 executing program 1: mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x30, 0xffffffffffffffff, 0x0) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010e0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 3: setfsuid(0xee00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:56:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000005980)={&(0x7f0000005880), 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000001019a55c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001100000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 1: set_mempolicy(0x1, 0x0, 0x0) pipe(&(0x7f0000003f00)) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 2: setuid(0xee01) socket$inet(0x2, 0xa, 0x0) 07:56:44 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001110000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x8401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc0189436, &(0x7f0000000180)={'batadv0\x00'}) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000040600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000068000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 2: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 07:56:44 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001120000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000004c0)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000006a000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 3: syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x10d000) 07:56:44 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) select(0x49, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x401}, &(0x7f0000000140)={0x0, 0xea60}) 07:56:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xa, &(0x7f0000002000), 0x8) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001180000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001250000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x8, &(0x7f0000002000), 0x8) 07:56:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5411, 0x0) 07:56:44 executing program 1: syz_emit_ethernet(0x1042, &(0x7f0000001a40)=ANY=[@ANYBLOB="aaaaaaaaaabbaaaaaaaaaabb81004c0086dd6978d35e100804fffe880000000000000000000000000101fc0100000000000000000000000000011d000400073008"], 0x0) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000800800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x6, 0xd, 0x0, 0x0) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100015c0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d, 0x0, 0x2}, {}]}) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x10, &(0x7f0000002000), 0x8) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000074000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001fe0000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x6, 0x21, 0x0, 0x0) 07:56:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"0f7eb73b675d35c0024223e8ef7e3adc"}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001040200e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 3: clock_gettime(0x0, &(0x7f0000000100)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x6}, &(0x7f0000000140)={r0}, 0x0) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 2: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x1cd200) 07:56:44 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) write$FUSE_BMAP(r0, 0x0, 0x59) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000300e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000ffffffffffffff7f000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00', r2) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000040)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x24}}, 0x0) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', 0x0, 0x0) 07:56:44 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) pipe(&(0x7f0000003f00)) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000385000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001020400e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:44 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x62440) read$FUSE(r0, 0x0, 0x0) 07:56:44 executing program 3: clock_gettime(0xe1eb1702a23472e5, 0x0) 07:56:44 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:44 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 07:56:44 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000388000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001060400e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:45 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x5f, 0x0}, 0x60) 07:56:45 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:45 executing program 3: setuid(0xee01) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000400)=[{}]}) 07:56:45 executing program 1: set_mempolicy(0x2, &(0x7f0000000040)=0x7ff, 0x101) pipe(&(0x7f0000003f00)) 07:56:45 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x2c, &(0x7f0000002000), 0x8) 07:56:45 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000ffffff8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000500e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:45 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000040)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0xc0109207, &(0x7f0000000300)={0x0, 0x0}) 07:56:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) 07:56:45 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000002690000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:45 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x541b, 0x0) 07:56:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000600e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:45 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:45 executing program 2: mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 07:56:45 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003a6000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:45 executing program 1: setuid(0xee01) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x301000) 07:56:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001040600e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:45 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x7, &(0x7f0000002000), 0x8) 07:56:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {}]}) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003a7000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000700e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 1: setuid(0xee01) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000600)="d4", 0x1}], 0x0, 0x0) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000240)=@buf) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 2: r0 = fanotify_init(0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001100)='/dev/btrfs-control\x00', 0x0, 0x0) fanotify_mark(r0, 0xa, 0x40000018, r1, 0x0) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003a8000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000440)={&(0x7f00000004c0), 0xc, &(0x7f0000000480)={0x0}}, 0x0) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000900e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22042) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0x18) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50}, 0x50) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000a00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 1: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 07:56:46 executing program 2: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmdt(r0) rt_sigpending(&(0x7f0000000000), 0x8) 07:56:46 executing program 3: setuid(0xee01) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003a9000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000003f00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001800a00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x19, &(0x7f0000002000), 0x8) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000008004000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:46 executing program 2: r0 = fanotify_init(0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001100)='/dev/btrfs-control\x00', 0x0, 0x0) fanotify_mark(r0, 0x2, 0x40000018, r1, 0x0) 07:56:46 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000b00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 1: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6c, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}}}, 0x0) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000005c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003ab000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x64}]}) [ 1662.193916][ T36] audit: type=1326 audit(1618214206.440:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4910 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:46 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000180)={'batadv0\x00'}) 07:56:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000c00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000f0ff7f00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x28}]}) 07:56:46 executing program 1: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8943, &(0x7f0000000940)={'batadv0\x00'}) 07:56:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1662.361484][ T3237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1662.367824][ T3237] ieee802154 phy1 wpan1: encryption failed: -22 07:56:47 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0x5460, 0x0) 07:56:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000d00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:47 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000001bc000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:47 executing program 2: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x6000) r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r0) 07:56:47 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003ad000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22442) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) [ 1663.018868][ T36] audit: type=1326 audit(1618214207.260:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4910 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:47 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003ae000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000e00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:47 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffffdef00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:47 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0xf0ffffff7f0000) [ 1663.165762][ T36] audit: type=1326 audit(1618214207.410:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffffe}, 0x18) 07:56:47 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffffff600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003af000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001100e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 07:56:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22442) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffffffe00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1663.983187][ T36] audit: type=1326 audit(1618214208.230:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001200e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 2: select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7}, &(0x7f0000000140)={0x0, 0xea60}) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v2={0x0, 0x0, 0x0, 0x0, 0x20, "1521097250f55257c1a18fc87bf87ac94e9e55df690000001900000002000000"}, 0x29, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/25, 0x19) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000effdffff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001800e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003b1000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001002000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000f6ffffff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22442) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) 07:56:48 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003b2000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xe, &(0x7f0000002000), 0x8) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001002500e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000002000), 0x8) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001003f00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000002}]}) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap$usbmon(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 1664.522066][ T36] audit: type=1326 audit(1618214208.770:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5022 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x4000000 07:56:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22442) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000001c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001005c00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 2: setuid(0xee01) symlink(&(0x7f0000000c80)='./file0\x00', &(0x7f0000002fc0)='./file0\x00') 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 3: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmdt(r0) 07:56:48 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000001c1000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:48 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000f0ffffff7f0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) 07:56:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010a8000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:48 executing program 3: pselect6(0xffffffffffffffd4, &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, 0x0) 07:56:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000001c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) read$usbmon(r0, 0x0, 0x0) 07:56:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001fffe00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000008800000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:49 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 07:56:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000003d2000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100ff00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:49 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x25, &(0x7f0000002000), 0x8) 07:56:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) read$usbmon(r0, &(0x7f0000000040)=""/106, 0x6a) 07:56:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_linger(r0, 0x6, 0xd, 0x0, 0x0) 07:56:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000026db000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001feff00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000ffffffffffff0700000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:49 executing program 3: socketpair(0x1d, 0x0, 0x1, &(0x7f00000003c0)) 07:56:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000026e8000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:49 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x1a, &(0x7f0000002000), 0x8) 07:56:49 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x32, &(0x7f0000002000), 0x8) 07:56:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000200e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:50 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:50 executing program 1: syz_emit_ethernet(0x19, &(0x7f00000000c0)={@local, @random="a095c22959bc", @val, {@x25}}, 0x0) 07:56:50 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000040)={0x0, 0x0}) read$usbmon(r0, 0x0, 0x0) 07:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000300e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:50 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000026e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:50 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x541b, 0x0) 07:56:50 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000007ffff000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:50 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000007ffffffff000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 07:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000400e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:50 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffff6000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000040)={0x0, 0x0}) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xf6a1a) 07:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000500e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:50 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1666.537964][ T36] audit: type=1326 audit(1618214210.780:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5117 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:51 executing program 2: syz_emit_ethernet(0x91, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000aaaaaaaaaabb08"], 0x0) 07:56:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000600e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffdf9000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:51 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x908b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x100) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000402000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:51 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0xc000) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffffb000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000700e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 07:56:51 executing program 2: syz_emit_ethernet(0xe81, &(0x7f0000001700)={@remote, @local, @val={@void}, {@mpls_mc={0x8848, {[], @ipv6=@gre_packet={0x0, 0x6, "6eaf27", 0xe47, 0x2f, 0x0, @dev, @mcast1, {[], {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0], "6cab14e13716fad164ee6e8f2eeb12592fdfe93eaff1217ac5bd7c54c128b65bcfc4bd76e0223c5a2cc9184cd7f1d099262c8f6159e33528617429a38aea6d41a28e4f2e97e5beb98ace9cac0c27"}, {}, {}, {0x8, 0x6558, 0x0, "eb6bd201508c3511871382c01bf51e67958bea2849a3bcfb43135cba5cb124b67b30fb379592fc3ab903bf9d0c16e9b561a020f418c4f6e7070a41a777bf0f118cb40ffec751b8f92c1e42c47e51a721b568e823af034b3573e04493c0cad8d4e50769295166a028de332fe1757f78d9817afc16c8e3e2bc41bdfd088d62eb28309040b4c832f304c93c03f32f00376eee72dffa240e5f88deabf0a9b1a92da0cb9ef2742f2d104d62b39fe9b357c80c3883b1b2ff412a029e757f3511716890006d7475485fcdb7f8d057e2d6"}}}}}}}}, 0x0) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffdfd000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 3: rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) 07:56:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000800e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffffe000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:51 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x12001) 07:56:51 executing program 3: mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 07:56:51 executing program 2: shmget(0x3, 0x2000, 0x1098, &(0x7f0000ffc000/0x2000)=nil) 07:56:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000900e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) 07:56:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5421, &(0x7f0000000940)={'batadv0\x00'}) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:56:51 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 07:56:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000a00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:51 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000fff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:51 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:52 executing program 2: syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x80, 0x8, 0x9, 0x80000000, 0x48b8b01b, 0x10001, 0x2}, &(0x7f0000000040)={0x2, 0x8, 0x6, 0x7fffffff, 0x80, 0x80, 0x9}, &(0x7f0000000080)={0x6, 0x4, 0x200, 0x7, 0x4, 0x9, 0x675, 0xc9}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x8a]}, 0x8}) [ 1667.709113][ T36] audit: type=1326 audit(1618214211.950:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5177 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000b00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockname(r0, 0x0, 0x0) 07:56:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000406000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000fffffdff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000c00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:52 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x10062) 07:56:52 executing program 2: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) shmdt(r0) 07:56:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:52 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x8906, 0x0) 07:56:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000d00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1668.516841][ T36] audit: type=1326 audit(1618214212.760:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5177 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(0x0, 0x0) 07:56:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000e00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:52 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x29, &(0x7f0000002000), 0x8) 07:56:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000006c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x40049409, 0x0) 07:56:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) [ 1668.707990][ T36] audit: type=1326 audit(1618214212.950:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5218 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:53 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000007ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:53 executing program 3: syz_emit_ethernet(0x115, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa"], 0x0) 07:56:53 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001000e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:53 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x31, &(0x7f0000002000), 0x8) 07:56:53 executing program 2: setuid(0xee01) syz_open_dev$vcsa(&(0x7f0000004c80)='/dev/vcsa#\x00', 0x0, 0x0) 07:56:53 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000007fffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:53 executing program 3: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r0) pipe(&(0x7f0000003f00)) 07:56:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001100e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:53 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1669.536747][ T36] audit: type=1326 audit(1618214213.780:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5218 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 07:56:53 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:53 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:53 executing program 2: ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000001180)={0x0}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 07:56:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00', r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x14, r2, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 07:56:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001200e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) 07:56:53 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:53 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001001800e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22442) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x34, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x34}}, 0x20040011) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0xffffff6f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008d00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) 07:56:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x1}]}) set_mempolicy(0x0, &(0x7f0000000000), 0x401) 07:56:54 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001002500e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 3: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0xe888e84dbd841b41) 07:56:54 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x4, 0x401) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001005c00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x7fffffff, 0x0, 0x9, 0x0, 0x1}, 0x40) 07:56:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000100)=0xffffffffffffff8e) 07:56:54 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100fe00e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000062c0)='/dev/net/tun\x00', 0x2200, 0x0) 07:56:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd700000000000070000990005"], 0x38}}, 0x10800) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000402e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000012000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x51, r0, 0x0) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x514, 0xffffffffffffffff, 0x4}, 0x40) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000003e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0'}, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002380)) [ 1670.217857][ T5321] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1670.236536][ T5327] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 07:56:54 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3a, 0x0, 0x0) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000002b40)={0x2, 0x0, 0x0, 0x3}, 0x40) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000204e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000025000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xe, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}]}, 0x1c}}, 0x0) 07:56:54 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@ipv4={[], [], @private}, @remote, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b50000}) 07:56:54 executing program 2: bpf$PROG_LOAD(0xc, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000604e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmpv6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x20}}, 0x0) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x7, 0x5}, 0x14}}, 0x0) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000005e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) r1 = gettid() sendmmsg$unix(r0, &(0x7f0000002a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x10}}], 0x30}], 0x1, 0x0) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x9}, 0x0, 0x0, 0x0) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000080040000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000006e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x4, 0x0, 0x9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x40) 07:56:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x801}, 0x14}}, 0x0) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000005c000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0xc, &(0x7f0000001400)=0x7, 0x4) 07:56:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc}, 0x40) 07:56:54 executing program 2: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x8) 07:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000406e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000ffffffffffffff7f000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:55 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0) 07:56:55 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00'}, 0x10) 07:56:55 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:55 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={0x0, 0x0, 0x8}, 0x10) 07:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000007e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:55 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:55 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:55 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) 07:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000009e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)='<', 0x1, 0x0, &(0x7f0000001040)={0x10, 0x2}, 0x10) 07:56:55 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000001bc0000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:55 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x1e, 0x4, 0x0) connect$tipc(r1, &(0x7f0000000100)=@id, 0x10) 07:56:55 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x5460) 07:56:55 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000280), 0x10) 07:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ae1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:55 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffffffffffffdef000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:55 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000fffffff6000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100800ae1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x11, r1, 0x1}, 0x14}}, 0x0) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000fffffffe000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0xffffffff, 0xf8, 0x428, 0x0, 0xffffffff, 0xffffffff, 0x4f8, 0x4f8, 0x4f8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000240), 0x4) 07:56:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x3, 0xd7}, 0x40) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000be1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000fffffffffffffffe000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x4}, @L2TP_ATTR_PEER_COOKIE, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000013000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ce1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000025000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x80000043) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000de1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1672.203422][ T5462] netlink: 'syz-executor.2': attribute type 18 has an invalid length. [ 1672.235682][ T5468] netlink: 'syz-executor.2': attribute type 18 has an invalid length. 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000007ffffffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x2, 0x6, 0x201}, 0x14}}, 0x0) 07:56:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x244}}, 0x0) 07:56:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000300)=@framed={{}, [@alu={0x4}, @jmp]}, &(0x7f0000000380)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000effdffffffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ee1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 2: socket(0x25, 0x1, 0x7e0) [ 1672.402020][ T5483] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 07:56:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x13, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000007fffffffffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000011e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000004c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x14, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback}]}, 0x38}}, 0x0) 07:56:56 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:56:56 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x21, 0x0, 0x0) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000005c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000feffffffffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000012e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x2}, 0x0) 07:56:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000027c0)=""/74, &(0x7f0000001140)=0x4a) 07:56:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) 07:56:56 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:56 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000018e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:56 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x2) 07:56:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x23}]}, 0x1c}}, 0x0) 07:56:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000001640)={'ip6tnl0\x00', 0x0}) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000068000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000020e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 1: select(0x2a000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x2710}) 07:56:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 07:56:57 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000000)={'xfrm0\x00'}) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000006a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000025e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 07:56:57 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x7ffffffff000}}, 0x0) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x35}) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100003fe1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 1: pipe(&(0x7f0000001180)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 07:56:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x102, 0x0) 07:56:57 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan1\x00'}) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100005ce1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 07:56:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x100000, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x3}}]}, 0x1c}}, 0x0) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000074000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000a80e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 3: socket(0x23, 0x0, 0xfffffff7) 07:56:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x4020940d) 07:56:57 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100fffee1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000006c0)={&(0x7f0000000100), 0xc, &(0x7f0000000680)={&(0x7f0000000180)={0x21c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x1a4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "5dbf53a7ac0ee17e0fa0a0eefe0c1b1cb4f8f0c15d"}}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "97e58914a76a8f4d6849674289135a1b45b2675eba"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xc1, 0x3, "f8c1392e1a7cd5a5fbf605370bfbcd285cb70e43f626ec2b25c219813e4814d2960938cf7172bc75c44975a5fb4ed8655019a699e74211ea6b654f18e69cc413526251cb0dbc6bf685596061e6413eb56add42c615878a2541d73b41aefd2231d47f2923569ac1a8a231c99924599dd1067829146ce613bad5737f28ab17d1747866463a9d0cc04a4621daf38e7a3ef076dcec528781ec9f1ed82b4f0119cddf3136c6fa10f7096603969d9c2b915ba3c6a33692c57ca6f36f4566b0cf"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "7492eb6898b37186f0981532d032f062aa48a05cfffebadeedf9199abc"}}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x21c}}, 0x0) 07:56:57 executing program 3: socket$inet_mptcp(0x2, 0x1, 0x106) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, 0x0) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000e010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010000ffe1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:57 executing program 1: pselect6(0xa2, &(0x7f0000000000)={0x1}, 0x0, 0x0, 0x0, 0x0) 07:56:57 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4008080) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000c0010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)={0x1c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100feffe1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xab, &(0x7f0000000080)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000c1010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f0000001640)=[{{&(0x7f0000000040)=@caif=@util, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:56:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x59f}, 0x1c) 07:56:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x244}}, 0x0) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000002e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000c2010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 3: socketpair(0x18, 0x0, 0x3, &(0x7f0000000080)) 07:56:57 executing program 2: bpf$PROG_LOAD(0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:56:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000004020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:57 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, 0x0, &(0x7f0000000980)) 07:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000003e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1673.654408][ T5641] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:56:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x13, 0xa, 0x401}, 0x14}}, 0x0) 07:56:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="020eff090600000027bd7000fddbdf25040004"], 0x30}}, 0x0) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000003d020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x1e, 0x0, 0x0) 07:56:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x7, 0x4) 07:56:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_COOKIE={0x9}, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000004e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000003e020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x1000}, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00', 0xffffffffffffffff) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000005e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x3, 0x0, 0x0) [ 1673.943484][ T5675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1673.960707][ T5677] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:56:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_COOKIE={0x9}, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000003f020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={0x0, 0xf0ff7f00000000}}, 0x0) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000006e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x5c8, 0xffffffff, 0xf8, 0x428, 0x0, 0xffffffff, 0xffffffff, 0x4f8, 0x4f8, 0x4f8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x308, 0x330, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x0, 0x4d6]}}, @common=@unspec=@bpf0={{0x230, 'bpf\x00'}, {0x0, [{}, {}, {}, {0x0, 0xbe}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x6}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x7f}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6606}, {}, {}, {}, {0x600}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3f}]}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x628) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x16, 0x0, 0x0) 07:56:58 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@timestamping={{0x14}}], 0x18}, 0x0) [ 1674.098479][ T5693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000007e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 2: recvmsg$qrtr(0xffffffffffffffff, 0x0, 0xffffff99, 0x0) [ 1674.190770][ T5705] x_tables: duplicate underflow at hook 2 07:56:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180)='802.15.4 MAC\x00', r1) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000027"], 0x30}}, 0x0) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000085030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 1: recvmsg$qrtr(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) gettid() accept4(r0, &(0x7f0000000880)=@xdp, 0x0, 0x80000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x3, &(0x7f0000000300)=@raw=[@exit, @initr0], &(0x7f0000000340)='syzkaller\x00', 0xffffffef, 0xdd, &(0x7f0000000380)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000012000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000008e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000080)='S', 0x1}], 0x1, &(0x7f0000000100)=[@sndrcv={0x2c}], 0x2c}, 0x0) 07:56:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000088030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1674.334373][ T5723] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 07:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind(r0, &(0x7f0000000080)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr-cast5-avx,wp384)\x00'}, 0x80) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000009e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000069c40)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 07:56:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "1f96539b89e65517eaa15c9eee2b6ae46757f38e1bfaa683a72c8da9f3b597ba7abe0d991124e087f8495ecb9c95c3ce7ff088ba5d7e047e1843fa4f67a6971d64c056c55bf2dc6ca8977f7fc72af2ae42469cf0c6ce22399fb8ea4fda4137bb8fa691877e80265939183a43c50e2c4ffd0992ffe59e2e5a8486c79f2466cd2217669c0c12f976d061ebaf417f8619ab1417169f59adfc8cfd72a6a7246b2896307b2919fce0b4636b221230a2238f264cfba93e40095b8017ec8b6f97bb5b5644aa332ad0adba541fe30ee8373c5a813fd56b2166cf4fb93c93102d6054f286558b13cae154f6dec594800c9b5f2132ac3cd9f39ef6a93d039c7171ea57fc5b80cfc26f7c8461537c4a3980027538a43f9fb3e0d57f1aacf09dd3995029c14a1828e5737fb60a55c55990a05f73aecff42019bb0df130a92d373703c6204e29bf14ca50cc416caed040d8c7a84bcbeddf173d27000383e83f6b82778e29ce6577ab48f7789c9746a79c3052a6a306ce3c5deb25409e87a221fd234e0ed2acdd2f1f2489176208c291fd3a4c35401ecf07aaf097c9240e6431de429a76eef8381599fadd6328af1e2bd8dd26b2bb6c4c689c9b8855968bdb8e5290b4fee581547cbdd2421f747488d666f2bcc51121218e694058ba684969ca5e70be0396bfab6d9434cfac0c2628c9f79a1f580beac9aee48aac31abb6853ff9ea6f1652b59b1198a6fb44b2997af81222fda7c282e63500fdd68fcbb7c86bad5998a66fa333c5209460ae6363a533891a4920b238a47596fe2f6a373c90cef643e7e94a487d6f458bafbd5c6b353249e749e3a92dfa5f3394a7d450c4ab28545f32674d57eb8433b3c70d561b6d8a9b0971a3f80e35bc6b3a63f21e203f72344624083d5d818d49f6fd4921267feb80c8c0e3d1a12cceb7da82081be021068b4da2f2cd5e83905d704b89a590b7fcb15e0ac5689c3a7eb289c0ac86614fd61627b868ea77fcf2f92319087bf0c4f3c99556c22b357f5d0ebdb7e04ecff90f9e061722933439872a7553523039ab5479a0ef451c41d4c383338e7ca899239a709fbe8a81a11b45d8fe868ce50e22a8522a8c92a6790296bad6e605a032b1678382bab90218c791682bcd844a1fd7ab799691d401f1e2093041fa30fe1ca03843b77b9e12388e2f8861df83601502244f03de460b7cf5ba483929a5669a6fd2a4bad1a1e004adca21a3102b35a441f662d461a7a0f2978a3713894627020b0b5d35599b6542265ea2dfb91afd74e59903d5a597b60d52a2a60504ef7aca53b623848fe132fb60409807a6c474c9b061de53f5edbeba3d9bce84714f0c8ecf227f29ec3494ce14e6c7aa025d44cc08eb0768ce5c6eb9b359de1e64b88f1d12c11717a3296f09649f8198d41ae91060f649ea3b5841623be478c13f7861946a89971416dd3d54576dbd6197b62cc7c4fb7896527af7cd09b7e060541d17c09d743906287213faf5c069fdf65b79290917593f48ccda23a631d2c1e536ceb3ea361c389a2794ad5e763d00ee075627e698d363108788dce773b935928a39e654fb0fbe1930fca68e8d60447edc3fe19282f4a2629323c739aec7f832dbe3fe10ef50fb7bd14bd4b7b71e98c2ecaacd359425a7550bd40ab8bc5cd149f1578d42dcdceabeefdf347c982d56c3615aaffd9c9e6c67390e2c5a93d540dcf78820f204c010bb4245a93f714e9591c76a7a186b2bf0cce442c98a7f202b9c207d833f3d322b700cb9f046fd50db6885de0f09928ad8fb74ca9bd71c7904a0effa0a16ec44ebdc08b6c4f29954c34be40818901be8a2da7f7a77d30af77e0d1d187b9ddb2331fe3cf1f4c003dbfa69cf0ddbb466098fc954a89357047d21de452a7238a81d7162db0014abd1a62513166f7a0763d60b7db7696870e2aacb7d97a17ac1563791ed9128a322bf7140c177995b8ea6259c50c0aafe3d486446491f0ff0481504ae5b65acea59a2d9957d7cfbbaaa8a85e1d07dc22edde8f919c9c0094a06794ca04568446239411d3b55aa0659b291e0ba31c96cd5eec5d157fb29fbca81a2576f0d483ebcf67c36e66c129cc91655d921b85b34dc347784d7dcb9c9768575a0848c322768282d5fd9459a95631d4313d7c327190c92ed0354cae25032c62c171aba2e702adc702320c815b9ab6bf54039d99ac3f45fc01dc5135772d83a0f44d4d66e4d8e5d9bb4f9db51ea2167a543f18d6df5a54e9e213fb2f8ed209dcc7eadb8385d0c32d99c523bc7568a69829259c9a33e3cf82393e59d75abda049f78ede9ba0cc1d62e434282a95e66763aed890be55f325b0220c55ed83836d0c7ad4e0f64baa0bfa6465ba1c2481808a2554c7a3689521b2b63bfcb4c2fe5f1c6c22009642a20a51ae8e7211fe7efe2d9dc5c28ce442bd5f376b0c68e905b55c150f9eb2e70fa624e094f343b0b8d4c7644ba023110786abd7569c14f10acb8665054f2042fec94530f47c48686ff0bab1cf690603cdf2484ffa8cb9d27d840f92dd1c6a35b96a4c043c6b625924dcf64997f54c85acabdb1b100175135acb02c06fb7c1e440265ae56af8d7ed18a44660011b91838d80e7dc6511a59d52a5f99d0b4fd475e3ba29e7a89c49108f6b328a47a2182d33529acdd3d4235d26d77ad6e6f627f6731d54ce7decaa68d3cf5ec41536c6332dfcbceac515f9a25fc41996becc5fdd91f3536fd89956bb4ec9dd95676a3b7f811a43cc824a0cb3581c02613b7287b4a3424c25177d53bc63749c7d13fd772cd9b034fe6657ec299a9461a6bcaed507266eb4733372760ea1e017b5da0ba952dae43c795536e432b54a350259f1fae1c691a4352f3e5bc0aba363e4820d1b5320cd48d6cd907ced18d78574c625ed4c2762142c05453d1f6d96a20b45f9b33784a5c76183ff0b1ef14f027d3a7c792855147f4971d12b41a4c01894ebe57b1fa787aea86336956f45700e4ea8c44e08060056d570cebb0bdf26d727194db1753f128a6f3446c15c3ce23ca435ea891acb0a54ccca653fbe13e62b7e7470a2574c7f2f212fa363c7fc84b3ac017c2baf18f7a7fc888a24abb8ca1848bf859bba228be5776b082828c52b81b860faf00c42aea418f03ecf6569f03537fdd5b67b74258b7a8efec8015cad7c1b5bbfae333a4c94691690fdd2810e433a477b04c83cd690c0d91106097bae6afc96d057435ec5589233715b75c34f6f89d9fd6a90137957e021e3f15a2fb80f95e5185fcd6d727bd748ef8efbeb46755b37430a300986997f387e2e32c4b9bba1a9f8d0c2ddb9866c64c7afb3f3b8a34e1d6d8d80aef0fbd5d596d2261d2b352de40c2879d8ecb89314ab9f055ff021dda7bed81c0a5e5051622a91288fdec9b44383737aef7b26c6ca969fe639332bc499727035c6a62574de4f788a7916a68b263664e28da7548a29f7908c7c32e4c4c7930fb92ff0d41d1e3e278741a267238893fb8f645c638e13a418a783f7b5d96a8918335edd6c87fd139be63cd4d72c2e15dc3988c8f4096729579bc0bb61815221e2cc3fe727697f10434d969a94f1f6a748a6cb9046796a2fdc54c34943d256d24fd85da291dadc4034b381d5a0aafc61b20dd26fae6f5d859054debc3523835c35297d9270e22f351929904ced220a1c4a30aebdf9dcf1be7cd022ec6f95bd435baba71a22eb9358fa64fe38cafd40185f441253361b0431677dd9711fb72b0f6f594721c386239198b7dce564e80394fb0f7e1e8a55969f4a0ecf21ea0fae06baf810a6ecaab5c5b591253ba06631129ad54a45efa745f9812d5a91bb9270a1561c7a2c4fb7b0bf66d5fc8a819d9905ab05c986d644ebc939f6be18d970614a193aa1febb97d4d5005589b09bebc3e3a3e33db3aa36fd2cd1afdc68434b9cc07d18a8b7fa23bccaf154208457730d7dc10bb3e7e3afe3a3bbfc17aee3548792516b22b117a1718248a1705501a4cd46de928701cb8209aba59ea3c70dae70a2ed26336dea3d5e1586ed024ac780d3319f7f6611fb97832d07aa27d377249d0ed487173f8ed2fdf7b7e88e8dd906660486ba60ffac665ceececda46db2a4faaaa872cd6a33680ef58b8725e916f4df7adcccdbc2f90c75b28d73fe4240ac2b1dc4f486179db2c3c4c21eb88ad394088ec998a1a70341725589b959c879bdc3ce9349c6361bc53e182f9e589fbfaf9ea91b2f0922cf54635fb4c6c62e68394c6111b56419d8387f7cf1b9d577cd1cf3e4c4f8b5c8b5763e74bb3988b585356e44197a895338787675b75ac682e3798201b30acffd32142b4d477d9715591f160d36f10c97f4f1de0b3b0dae8ed27bf88311b5b7963f2b558a29dc99363e6c3de57a3d7ff399b8a5a591e2737ae33bb45cdc75ff27774166b5b1579873dc29b2c5fdcf569d7b7ab7c66a9e34ccd56dcbe5b5a0275db8e8f2da4c7b31c2603fd8b5ece46cf2da88a681a250935508bf16acb88ad27bc980ed9f4a5a335b1caa5114a45a5f4cb528318eec2dc0eb744ab8754e63b28fe48f714094f4fb281080d7642a70a2d482969a7cba77e224c5b9d62312a59d0c511ff6a595f91f6846eaaefdf25240ccb8f2f5fc1781bc3b066bce37608fc3fe7f7ec7c97bc0ebbf877b23beecd59f92736b4be415e065291bb658091963b078fa7e72079301ec8215542ad81e2d370fb4f2c38223440818a2e214b112f077d2ecd0bb1801e92687ff43c601cdb3b4632e13f055dfb38d3521f25fd1d8b7f11a2a86d577556e4ac6c6800c3165852df95b241c6819e1dbffe6d9a773c1a1a74a4d6f1e73c2724d28216cf01d50d8513f0f2a7b3b7bccd033773d86b74873f62884e4344c20561790f38961f3d2ebf8cca927a6747c4ca50aebefdbe0840a6c5ae43845392913f1481001598d0c55a33152d27729292372d43e86956e1e9b705f3aef85693a6ed5a4c9b0647e95e01fc0645005823cbbe2266d26557bcace1549c92eb5737005d3fcd73189933bf6a761b1333399d8344bbf438ff9ed479e8ca2d3f5c0c5ad6fb8dee6ef84eb42df99cc4e38969195eb91ac21b40d36071750066418528858f9626041ff533676870a500b5c5dbcd1e760e3a4f3288afa738c79e96c88bb8f6869027a8036694c520b2992a10c9cc21bf13e304881bf3c3582600d767163d5a0f7350efce6de74de49ac3c1b7a597170f11f9419f011d3086e905a54b4950804f30e9fa51300f4b8679fe12a89c63e93c0faccb7d64e69d213601e0fed67cc14b071349eb5c9bfeaa7e7c59bfebfd76dd0d6a5dbf71f3d23b35c2a45acc3a45ae5e314074c82528b9e4ae7d17127b9cdb3ee53d06d1cf9785be95151ef5fec6016fed0be3b09c61a1aca720aad91a140f148478fb6c7f6ee768be12283d88ed35c6c402ae4246dea631f397e627b4d8f847e98bd02a790dfebfaec44de2c9ab553e886c0b1ff9857d409095a146a0a052478dc1036b3c63a7579ced325d97dbd96e86ec8a205509a060fe535409e9be49184c8c2894fcd0cdb05a804a89f9ebe9e06926b109fec73353752d10894a7edb9aa1723bdf9cefca1268cf7338c3297f8f0536a2bbdd5977b9ca44aba8458954a14f0ef86ebb8e5d29216b6a1df34895a877ad8e94bc387cb6e843a67f749a804a74adc12877b6724e556e40fb13214860233a5f947f78e52b28695811880749e6d109abe84f658a4133f1c2d918dd16eb777c5d44008e244f500f7c66bac817b02deacaebf143274ff02b733c6a592890159a11cb32daa2fd96e5"}, 0x1001) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000025000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000a6030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ae1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getpeername(r0, 0x0, &(0x7f0000000080)) 07:56:58 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x9, 0x0, 0x0) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000005c000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000a7030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000be1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:58 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}, 0x0) 07:56:58 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000001340)={'caif0\x00'}) 07:56:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fe000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) 07:56:58 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) syz_mount_image$udf(&(0x7f0000000080)='udf\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1004c0, &(0x7f0000001340)) 07:56:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000a8030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ce1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000004020000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x39, 0x0, 0x0) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000de1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB='\a'], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x9b, &(0x7f0000000280)=""/155, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000a9030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 3: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7}, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x1b, 0x0, 0x0) 07:56:59 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xa, 0x0, 0x0) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100000ee1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x3, 0x4) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000aa030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000015c0)="e0", 0x1}], 0x1, &(0x7f0000001680)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000002040000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3e, 0x0, 0x0) 07:56:59 executing program 3: socket(0x25, 0x5, 0xfffffffb) 07:56:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={0x0}}, 0x0) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000010e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ab030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000006040000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 1: r0 = socket(0x2, 0xa, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000d80)={&(0x7f0000000c80), 0xc, &(0x7f0000000d40)={0x0}}, 0x0) 07:56:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x0, 0x0, 0xa97}, 0x40) 07:56:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00', 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000500020002"], 0x2c}}, 0x0) 07:56:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ac030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000011e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r0, 0x0, &(0x7f0000000080)) 07:56:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 07:56:59 executing program 3: socket$netlink(0x10, 0x3, 0x8a13538be9e84f38) [ 1675.178757][ T5841] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1675.195268][ T5843] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000012e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ad030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 1: socketpair(0x29, 0x2, 0x0, &(0x7f0000000180)) 07:56:59 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xd, 0x0, 0x0) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000004060000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000018e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x7, &(0x7f0000000000)=0x2, 0xd) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ae030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x38, 0x0, 0x0) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x13, 0x0, 0x0) 07:56:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1, &(0x7f0000000300)=@raw=[@exit], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000025e1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x20}}, 0x0) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000af030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000200)={{0x3, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef01000100005ce1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 1: bpf$PROG_LOAD(0x3, 0x0, 0x700) 07:56:59 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@ipv4={[], [], @private}, @private0, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000b0030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef0100010000fee1f4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:56:59 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) sendmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 07:56:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slave_0\x00', &(0x7f0000000080)=@ethtool_rxnfc={0x2a, 0x0, 0x0, {0x0, @tcp_ip4_spec={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @remote}, @usr_ip4_spec={@rand_addr, @multicast1}, {0x0, @link_local}}}}) 07:56:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) 07:56:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000b1030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:56:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000b0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:56:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={0x0}}, 0x0) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4255f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}], 0x1, 0x0) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000b2030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x2, &(0x7f0000000200)=@raw=[@initr0], &(0x7f0000000580)='syzkaller\x00', 0x9, 0xcf, &(0x7f0000000280)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f45c5f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f0000001740)) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000b3030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x22, 0x0, 0x0) 07:57:00 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000080)) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4795f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x1d, 0x0, 0x0) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000d1030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 07:57:00 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f020000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'nr0\x00'}) 07:57:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000d2030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x20}}, 0x0) 07:57:00 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f00000003c0)={0x1f, @none}, 0x8) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f030000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, &(0x7f0000000240)) 07:57:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000002040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@func]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000200)=""/157, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f040000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='GPL\x00', 0x1, 0x88, &(0x7f00000000c0)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10}, 0x78) 07:57:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getpeername(r0, 0x0, 0x0) 07:57:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f050000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002ac0)=[@rights={{0x10}}], 0x10}, 0x0) 07:57:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x14, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}]}, 0x30}}, 0x0) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f060000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 1: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'memory'}]}, 0x8) 07:57:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000048"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0xc9, &(0x7f0000000380)=""/201, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000c01b0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f070000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x9effffff}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x24}}, 0x0) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:01 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f080000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000180)=0x20000002, 0x4) 07:57:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x244}}, 0x24000100) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000250000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000004060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x34000}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x24}}, 0x0) 07:57:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004000)={0x18, 0x2, &(0x7f0000003ec0)=@raw=[@map_val], &(0x7f0000003f00)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f090000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x19, 0x0, 0x0) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1677.390204][ T6025] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1677.407150][ T6025] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 07:57:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00', 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @private}]}, 0x1c}}, 0x0) 07:57:01 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@ipv4={[], [], @private}, @private0, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44}) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0a0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x12, 0x0, 0x0) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000005c0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x9}, 0x0) 07:57:01 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x890b) 07:57:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@call, @alu={0x80dba8a6e93d341e}]}, &(0x7f0000000080)='GPL\x00', 0x1, 0x88, &(0x7f00000000c0)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0b0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:01 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000008800000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x23, 0x0, 0x0) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0c0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) accept4(r0, 0x0, 0x0, 0x80000) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 1: bpf$PROG_LOAD(0x3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000001bc00000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0d0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000001140)) 07:57:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000002b40)={0x2, 0x4, 0x8000, 0x3}, 0x40) 07:57:02 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8906, 0x0) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fdef0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x2, 0x0, 0x0) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0e0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="020e"], 0x30}}, 0x0) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x5ba0]}, 0x8}) 07:57:02 executing program 3: bpf$PROG_LOAD(0x19, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000effd0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f100000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="0203ff1f153260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x18, &(0x7f0000000000), 0x4) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffe0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000280)) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f110000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x8, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_COOKIE, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) [ 1678.203303][ T6108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1678.238820][ T6115] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 07:57:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000002b40)={0x14}, 0x40) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000010e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1678.281142][ T9404] Bluetooth: hci1: command 0x0405 tx timeout 07:57:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f120000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 07:57:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x440a}, 0x0) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f180000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x2e, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0x0, 0x6, 0x3}]}, 0x28}}, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000feff0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f250000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:02 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000140)) [ 1678.541017][ T6146] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1678.555078][ T6146] nbd: must specify an index to disconnect 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="0214"], 0x30}}, 0x0) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f5c0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1678.584661][ T6152] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1678.613340][ T6152] nbd: must specify an index to disconnect 07:57:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00', r0) 07:57:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000300), 0x4) 07:57:02 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000040000800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:02 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffe0000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000001840), 0xc) 07:57:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, 0x0, &(0x7f0000000100)) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}]}, 0x1c}, 0x10}, 0x0) 07:57:03 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x23, &(0x7f00000007c0)={@private1}, 0x20) 07:57:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f040200000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000d00)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0xa8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_BEARER={0x120, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'eth', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xda19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_NODE={0xcd8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x6e, 0x3, "fb59afa869cdb90ed71683df590da2bcb67a5c7a65853b61ea047e0237816f4b88ffb2313c356cc1d4852c1f6dbd8689d1a27a2e6b6205e5fc1a7adee31064b2ca9bfadee48ac75f57092e724c63b62fa305745d13b8cfe782a15e0c813fe54c1e54e2db7820675aeb8e"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xc5a, 0x3, "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"}]}]}, 0xec8}}, 0x0) 07:57:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180)='802.15.4 MAC\x00', r1) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002700"], 0x30}}, 0x0) 07:57:03 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x42, 0x0, 0x0) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000300000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'veth0\x00'}) 07:57:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x5, &(0x7f0000000000)=""/198, &(0x7f0000000100)=0xc6) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f020400000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1679.057773][ T6196] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 07:57:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000019c0)={0x0, 'veth1_to_batadv\x00'}) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000007ffff000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@private2, @mcast1, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f060400000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000040)) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 1: bpf$PROG_LOAD(0x15, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000250000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x6, 0x0, 0x0) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000500000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 07:57:03 executing program 3: select(0x64, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x2710}) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000090260000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x1, 0x88, &(0x7f00000000c0)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000402000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000600000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}], 0x1, 0x0) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000db260000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)) 07:57:03 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x32, &(0x7f00000007c0)={@private1}, 0x20) 07:57:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 07:57:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001400)='TIPC\x00', r0) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f040600000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:03 executing program 2: bpf$PROG_LOAD(0x13, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x28}}, 0x0) 07:57:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000e8260000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8}]}, 0x24}}, 0x0) 07:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000700000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) 07:57:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd700000000000070000990005000600"], 0x38}}, 0x0) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000e9260000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000900000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000300)={'veth0\x00', @ifru_data=0x0}) 07:57:04 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x80108906) 07:57:04 executing program 2: socket(0x11, 0xa, 0x7fffffff) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000a00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1679.850999][ T6280] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1679.885734][ T6287] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 07:57:04 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000023d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 2: select(0x40, &(0x7f00000000c0), &(0x7f0000000140)={0x3}, &(0x7f0000000180)={0x4}, 0x0) 07:57:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f800a00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000406000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x35, &(0x7f00000007c0)={@private1}, 0x20) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000023e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) 07:57:04 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000b00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000140)={'sit0\x00', 0x0}) 07:57:04 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x38) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000c00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000023f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x15, 0x0, 0x0) 07:57:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) 07:57:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180)='802.15.4 MAC\x00', r1) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000027000000060004"], 0x30}}, 0x0) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000008008000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000d00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 2: socket(0x22, 0x0, 0x7ff) 07:57:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xab, &(0x7f0000000080)=""/171, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1680.424261][ T6346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 07:57:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000e00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000081) 07:57:04 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x16, 0x0, 0x0) 07:57:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001100000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000004c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x49, 0x0, 0x0) 07:57:04 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, &(0x7f00000007c0)={@private1}, 0x20) 07:57:04 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 07:57:04 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000aa550000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:04 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001200000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x80000000) 07:57:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="020eff090600000027bd7000fddbdf2504"], 0x30}}, 0x0) 07:57:05 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x30}}, 0x0) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000005c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000540)=""/65, 0x40f00, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x8, 0x4, 0x1000}, 0x10}, 0x78) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001800000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000)='NLBL_UNLBL\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x30}}, 0x0) 07:57:05 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f00000000c0)={0x23, 0x0, 0x3}, 0x10) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x2c, 0x0, 0x1, 0x101, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @broadcast}}}]}]}, 0x2c}}, 0x0) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f002000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9}, 0x40) 07:57:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0x88, &(0x7f00000000c0)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) socketpair(0x9, 0x5, 0x400, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r4, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 07:57:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, @isdn, @sco={0x1f, @fixed}, @l2tp={0x2, 0x0, @loopback}}) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000006a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1c, &(0x7f00000007c0)={@private1}, 0x20) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f002500000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 2: socketpair(0x11, 0xa, 0x68da5fa9, &(0x7f0000000100)) 07:57:05 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8910, &(0x7f0000001340)={'vxcan1\x00'}) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x1c, 0x0, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 07:57:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x8, 0x0, 0xfee6) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f003f00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000012000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x18, 0x0, 0x0) 07:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8932, &(0x7f0000001340)={'vxcan1\x00'}) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f005c00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @loopback, 0x0, 0x700}}) 07:57:05 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8932, &(0x7f0000001340)={'vxcan1\x00'}) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000025000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0a8000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f0000000040)=@raw=[@initr0], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000007a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004000)={0x18, 0x2, &(0x7f0000003ec0)=@raw=[@map_val], &(0x7f0000003f00)='syzkaller\x00', 0x0, 0x21, &(0x7f0000003f40)=""/33, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000000)=""/255, &(0x7f0000000100)=0xff) 07:57:05 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffffe00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:05 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, 0x0) 07:57:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8520"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0xc9, &(0x7f0000000380)=""/201, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:05 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003850000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) 07:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00ff00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000080040000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003880000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002b40)={0x9, 0x0, 0x0, 0x3}, 0x9f) 07:57:06 executing program 1: bpf$PROG_LOAD(0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffeff00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 3: socketpair(0x28, 0x0, 0x80000000, &(0x7f00000000c0)) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000005c000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000026900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 07:57:06 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89a0) 07:57:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000f0ff7f000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003a60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000008000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x5, 0x0, 0x0) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003a70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 07:57:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'batadv0\x00', &(0x7f0000000140)=@ethtool_per_queue_op={0x4b, 0xe}}) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001bc0000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f400008000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003a80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000800)={&(0x7f00000001c0), 0xc, &(0x7f00000007c0)={0x0}}, 0x0) 07:57:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f0, &(0x7f0000001640)={'ip6tnl0\x00', 0x0}) 07:57:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffffdef000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003a90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000020000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001180)={'sit0\x00', &(0x7f0000001100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 07:57:06 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x12, 0x0, 0x0) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffffff6000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000010000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffffffe000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003ab0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:06 executing program 3: socket(0x2, 0x0, 0x10001) 07:57:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00', r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x2e, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0x0, 0x6, 0x3}]}, 0x28}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 07:57:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000020000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1682.431221][ T6582] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1682.443326][ T6582] nbd: must specify an index to disconnect [ 1682.463319][ T6585] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1682.474345][ T6585] nbd: must specify an index to disconnect 07:57:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x2, 0x3, 0x3}, 0x14}}, 0x0) 07:57:07 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x0) 07:57:07 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:07 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000effdffff000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000004020000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000080), 0x4) 07:57:07 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003ad0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000030000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:07 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000f6ffffff000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000801) 07:57:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf4240, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 07:57:07 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003ae0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f2, &(0x7f0000001640)={'ip6tnl0\x00', 0x0}) 07:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000040000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:07 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) 07:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000050000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:07 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xc, 0x0, 0x0) 07:57:07 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:07 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003af0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:07 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x894c) 07:57:08 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x7, 0x0, 0x0) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000060000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @loopback, 0x1}}) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002b40)={0x2, 0x4, 0x8000, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x40) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000004060000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000006900)='/dev/net/tun\x00', 0x0, 0x0) 07:57:08 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000014c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 07:57:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={0x0}}, 0x0) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000f0ffffff7f00000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000070000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003b10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x38}}, 0x0) 07:57:08 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002480)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003b20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000088000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000080000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x7fffffff}, 0x8) 07:57:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x9, 0x1, &(0x7f00000027c0)=@raw=[@alu], &(0x7f0000002800)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000090000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x2, 0x6, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}, @in={0x2, 0x0, @loopback}}]}, 0x48}}, 0x0) 07:57:08 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x2}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={[0x5ba0]}, 0x8}) 07:57:08 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x2) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000ffffffffffff07000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSACCEPT(r5, 0x89e3) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000a0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x244}}, 0x0) 07:57:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180)='802.15.4 MAC\x00', r1) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000027000000060004000000000014"], 0x30}}, 0x0) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000001c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000b0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 3: pipe(&(0x7f0000000040)) select(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000080)={0x8}, 0x0) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000001c20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1684.473994][ T6698] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.3'. 07:57:08 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSACCEPT(r5, 0x89e3) 07:57:08 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x1800) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000c0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:08 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getpeername(r0, 0x0, 0x0) 07:57:08 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003d10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:08 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSACCEPT(r5, 0x89e3) 07:57:08 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0xbd08}, 0x8) 07:57:08 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000007ffff0000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x18, 0x0, 0x1, 0x101, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000d0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000003d20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSACCEPT(r5, 0x89e3) 07:57:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000e0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000026db0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000007ffffffff0000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) syz_init_net_socket$rose(0xb, 0x5, 0x0) 07:57:09 executing program 1: socket$inet6(0xa, 0x0, 0xffff8001) 07:57:09 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x6, 0x0, 0x0) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000100000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000026e80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) accept4$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000000)) 07:57:09 executing program 1: pipe(&(0x7f0000001ac0)={0xffffffffffffffff}) connect$netlink(r0, 0x0, 0x0) 07:57:09 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000026e90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000110000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 3: mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 07:57:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_COOKIE, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) accept4$rose(r2, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r3, 0x89e0, 0x0) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000c0ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000004020000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000120000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000003dc0)='*\xcf--@\x00', 0x6) 07:57:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x12, &(0x7f0000001400), 0x4) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) accept4$rose(r2, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) pipe(&(0x7f0000000080)) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000180000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x0, 0x1}, 0x20) 07:57:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)={0x14, 0x5, 0x1, 0x3}, 0x14}}, 0x0) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) accept4$rose(r2, &(0x7f00000000c0)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x1c, 0x0) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000250000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000fff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x49, &(0x7f00000007c0)={@private1}, 0x20) 07:57:09 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, 0x0) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000001dc0), 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'veth0\x00', {0x1}}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={0x0}}, 0x0) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000003f0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x0, 0x280, 0x280, 0xffffffff, 0xffffffff, 0x3b8, 0x3b8, 0x3b8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, [], [], 'veth0_vlan\x00', 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:09 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) pipe(&(0x7f0000000080)) 07:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000800400000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:09 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) 07:57:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x79, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_PEER_COOKIE, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x79}}, 0x0) 07:57:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) ioctl$SIOCRSGCAUSE(r1, 0x89e0, 0x0) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000005c0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)="0a7249db", 0x4) 07:57:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000004060000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)) socketpair(0x1a, 0x6, 0x0, &(0x7f0000000140)) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000a800000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000100)=0x3, 0x4) 07:57:10 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={0x0}}, 0x0) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) pipe(&(0x7f0000000080)) 07:57:10 executing program 1: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffffffff60000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000080)="81983ec8f10112a69d84b06c8b15e69a3619a6c1da0bb092876cafc72e66cd5a929a183a2ce54f673ff8dc9b0f0c1ae86f92a012602cfb6a82a400c5e3d90a3efa839b00b53613163bcd192145dd56708841f369630fc4e81111367773b1eb25907741dd26eb98f6a12241f0c55ce8309d94efabb729d0e85feba4fdcea335498f5d1ea379204d0ab15077f7ff33b06fd18618693aa8ad41d6e86b9a98e9a210dec04a054835389af08772b668d0106fea6faf93", 0xb4}, {&(0x7f0000000140)="9c4157f92a855b34392c4fa0ce8363cde8c3969883df2bc9d366ebb687c23ddd5253be53a3519ada356b12425d7097ef23e49aa0e9e83ec3bc203bd96a66ddb97296c6d2b24ca911920f71fa6d864083d04b41129db3c70b72fcfb07729b77a4dd31ec89d58b77ee85b32dce0398c4ae8ac3e14bae39d493a64905f8fee26ac8c648b17577f6a18594b4f1d0f18e940f1f86eb7833ed1759572575153b9d4524cd6e2696c4060dc56d66a5cd6435ffee3e044d483a1c9b3824b36ecb0117d04cae5536d04941", 0xc6}], 0x2, 0x0, 0x0, 0x44004040}, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000340)=0x6e) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000380)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000003c0)=@sco={0x1f, @none}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/65, 0x41}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000500)=""/229, 0xe5}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/91, 0x5b}, {&(0x7f00000006c0)=""/233, 0xe9}], 0x6}, 0x2) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000c00)={'vlan0\x00', 0x4}) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x6c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x48000}, 0x810) sendmsg(r0, &(0x7f0000002200)={&(0x7f0000000dc0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @loopback}, 0x4, 0x2, 0x1, 0x3}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000e40)="b7f53791", 0x4}, {&(0x7f0000000e80)="35a5d5de31fef604dbe10b8ca8f0b5f172ec3f2ef6f55c56a4521b0f4034295bb05ce988de5092d086e3b5d135197b8a2913dc3241f9f98c530e1b984c29ac9220666c786afb3154260c524388ffbe6ae519eea793a7fc5713bdf899508d88c8aa3fd6e5aade699d221736add03dbc8cd8febcffc275d060e0b8fd80fd272fc616f4a27c372b2a722ebd9e77630ded4b364ec06daa73f5d27391c0f44301848e6dd52e34e784ce9e8d7c2303de3c6f67b7897ea5e27a36e125f853aa7ab862bc373ee1dec9d5f8d5d87ee18d1daedb", 0xcf}, {&(0x7f0000000f80)="c8715b295510ff6c1e705556f7624e4b348f3fd0b7c98b62af2d803e1daac982dcf0b8278dcf311128ada17b71c25a4d1a15f65822f0e44adcc3a6b8bc17d5426b4244d6cc5b39dbcf4a90f538f00e0e2463e164c05d6d759eca647705729dcb2414c56f6d7d6236f10a60dd6b633dbdfb664c87487a6f746474d2fa1974108e0e297b0473049ccaa231c203fef9bdef7f6cc20c2562da2c5c", 0x99}], 0x3, &(0x7f0000001080)=[{0x38, 0x88, 0x8, "820ced64845d992c33c2b057dbab4ebd2e6f53d6b598496282208e179522188e17306f"}, {0x30, 0x103, 0x5, "fb3e7d9371f1c70b5542f354e2969eedf06ca70e9e0b09c63f8f11ef7d1fa3"}, {0xd0, 0x102, 0x0, "ef2b96df0f2152b3427896fd8e3027c5948fdb56d82924d02c4fe0d0cb8454f9da8ecdc6127d8472f756331caa24c935aafc17dc55e52c2cc6459f0b409ffdc0ffe898c61af4065995292d94359e15c44bdef1c1ea67c8513d74cb1f6c44f5430ab091f804ef23ad0db844d4ad2b719749e5c9f9d05ad1a312ea96f0518103ee4aa023fb8edd7201ce4d3165acf69a25c94e1ae56d3f2871094fe5a7564b2178f571e6fc1e75611f62c9b4f63b9c3faa1728e5b38a5fe41aa0330738"}, {0x1010, 0x10b, 0x9, "51d437a2cb4a089fff612a69c8ee98f812c7763f9a6a73f7b5889d3f368674974e1b53513a8c0b4154941eec322bc8417c578e8ebe454bdb4682cb680fab7de118a4d4b8440e3d300d71820620385b464d7d2671353574f13d1510cade9bc4829d19a39fe0a0c50f85d9874864fcfafa02521184d3571f8861389d618695813860630dec3df2b6ba57607d362679a5e3caff2e6ea80e21534df1b86a77ba3345901d613ce0e98fc19beda558fbc68743bfdb77991af3022d6a8e411268a5e989825e7244fcbe9df2fd75b0a5ee3d11853594f1b2970d2852ae563d9e918527b116f4cc422ab4f2e7405a6803800b6000d9217cd03f53c0a014451cb4f409c850ce5198036af8423d00e96325803a7641789a4ea61630beda9919d63bf8d71714fd85cb13093c9b36fbb4815b2fb5f237a4737e2e7e96978cfccd1de8eeb3be50112a7a109aaca9cf39dfafff2abf03588d6762032897e4f3c956d40426ae4ff168650b3da2a4eb3e249832a897e242e37edb963611d167d065c8ccdc2afb9ae8ea6ffa1f22de60e6c7f1498ddfa53855ac38ef1ea970d8f776478c1416369bf7970d77c56b363f4918e18193c150e35715bd6c420dac6ee4ba767b721e0e440cb6b732aab5c418cb63148b59efbd8a16b549a311503c5d9bb3fd5d496c083218decbbe1e47cdac3e16fa342f607becf0035468986196f9e82a4a0afafb84fb83ade7dac1a5ec7f32375d2be6adc56499f4e13b2ef3bc7a462c4b8a87210e18e94247e77f0cc22659006267f02165163f8506d4b1ba6088bcaef02667574d2a5456073d3324b933d63613f6029c7912a26ab15d814878cf28d020a2ee1020b1552dc4092d4d3036e454f4c09cf2bfa761b9dfa4a5a7159ca0c6c2d8682f0c7a90ffd22dd1c21d12bc6583b4ff07f33c173f78feb9656ebaa769935959385c8751fa81f1332ce7a1e569f84dad4c727ce874bd7eadfae0287d5f29ac602f85d28071b85d4de3d2bbf4bd42bee06e1908465ec73b0502d54c7904007511ee70f6ea79c336e10406f6b5fc313484c212ebfd170d39662d6920f92fcf64ace994c07d0d65904981f15894d5d0a306c083c7bb5e2480f4b5a71ae9c17970938b974ee7f8662637ec90ae78bbddf178c532934d7e34f97f8d3415d5af3e01f87649172d345249fe65ac47c81716f4a672b74d0476d3d77c87e559471c53c7eb0c64cae1f402b4c87a8bb6cf1133462228876129ef7b6b205e0b0bd0fd2a2fb9740ad3a4e785f3aee2434c9755481d071e22431e047d00ab6859aa0f8a826ca2b2c6434d41ba8998650f3ef386189384183cb514b85c8419ca11da6a3b3dfd745b9c64e54e80fb2051e51e4d1591d144427269515c08ee6f1e4aa320bc891ee9db0901f3b559e75ee362bb146b4e8d55b727c6a32369e2df51dcfe6cfc88454bba5d09820a8fd2a59d6db239dbb16326fcccebd53b7aa79ef5f0d5130b5143c214058f7e7290cf35b8cd737dfd4cd35f5116ad04309b7876744a2b627519265d80f74b72183c53404c39722cd0e46d617462391b819ceaab955f9572132111ef2a6d3bfbeb50947d69061791a5473975b070fdbec33030a884f4d1e31a9bba67314170a470d7fb77e384640c32651b511f8b4a59abbb36ad0e6a00fa887bb074554876992542b125649b30e1228085081cc569aefe9e3bd21134370e142906a4a4c991e2d9c28ad14901f62f5efbdaf03402fe1dc5f226a336ee86e50feefa0050bc0368238adab18c310708a4708926dc1720406cb3124ccd9e0924a8c4a7c6b13e78c024149c0fc7f3c167654a3592bd37467e40893ccd85c5ea1162881192abcf4d5d8e98c78b70b0e49355c931b2db1c4bee45ad96d10a0547777e735ec1d0470027c7667d7d7c6aff2793a99ee9706cf5627f52a380a96d33a2fb359156f534e0478012e56c9dedf46a42b628d273f2289a206b44492583f0d80b16dac50cff57f525e9681d38336c8cc00c147f9ac48eefd86a5689acf85a144a335e919a36b87eacf5ba9c5a553317117c21232ca34cec6cfdbf380abee34c34ea6b916ce6a65db0b367b65dc80448425a4c2f2b06f3815e45e3e8dd55d1f4598eb44efb07a7e5a2b8a008e68286db2e2df5182294db07e62335420a3741918a10133bec206561faf54c785b0b92903c3c49c0036753311da92d6720a25dfda462bf912e211d94ff3ba98eb2a41200a334cc54041420aa667c07e6d514d1a01d74b20dbbdc1001472d0c7a34c619b2c60cc815e996ea2390aa46cf597ad7fbb0d8f4584679effff152f740ed5ca70f535f5b8e23e10a1bc228b0db5c7200ffbb85793cd702709b2befa0fd179801ee25de752cdbba0388919e5fdc676495e2a6e76a9577e537a72b2baba3c31e242af9b895d2f3d452391b96a04ffbefc84639226c4c91679e383c017a283f225089936e601c026aa46a8ee15becaa2eab1fe4fcc27d709caa645959bdc66d4261045974dfd3d9456152a1d866af73e67d0e56dea14b61982e004a97489ade3b18641210182f0055ce630036c75eac921aa7ba43e0ee8a95492cf4a77b776917d1bcf87f53f3932c3fe38625dfe07c398a21ee9d341d10087c4334402e9418dd1c7511a69a8f25db1d7cb55a79d9183debc1776dd27a5462570f382cb90ec21be13c46e66bb2908cf82f882e1f7d05d86e099764f1065d713f98b38ab3218c400556c9ed37545923f1b648c1c1ab025e107f6183a04673dce1cbef0e1bdc46668c298c44d0da026c48b6faceac5410f6c0205f8a0e8b07d31bd34c01033d3df05a0afd61f5df3eba02bea3804a9fac2ffa5c9f6e336c1b5a60ca53f6ff941f17bb6c2bf97c5c42ff8b83cfafe369bfc856ab38b706790a91c40d475b74c105a6fe8e8b7801ceeeae859afd09d05359c1874d4e7ea28516a7b27e1767ec2526b1db5c0206730cf47d16a872d79058cc3a0b2b4aadcd4efb3a12e19b272ec5630214b84ee4b557b1ec1063676a8339cb596fa78524e186af8a3d187102d2d5e5abce27fdc02dd6e1a79374b86594dab02018869f057799d4ad20f76b32bcd22218d8113d64b8f61b7e1ba615bb7089365de123ca7bfaf331692538e4553bf5711b11d68b2a9989dc5e00727536dd74561e623d02819d1653f16c3909f20f9ab1b706147fbb18326d11eedefcfcdc5fb03def1590769dcce2af552dae437d6138ad1d1f3b159a0e271ee3f268b3d266f8b5fa6153958ef34179a7b7af7a52a688e4f24f64ce8af94e5dcbdfa3e8ab70b1cded37b1f7c493368ce6c19b78310f75aa4a1bbbaf9aa4f0bb11416072539753d2d0bf58c484e3a99fe26f02309efe9a2d3f64a02a81a7935c8db3ba02d7a1ace0116b96f02f17efe0ec5afab0056174e4bd81b89e54e2db7dee3d4e39617f67ff52886bdeaeb86b2bd4881c33dcfdf182dc1005f2f90bc61391a71d4a13390bac3ac7af7281c9fe98c250e74350896752d3f2c9640a1fcf4ee5da925d2e54335cdd88445ea4edec336d389f2f45a08f385ba9236d342da34c20f568296f14731fc19d7871c276a3adaaa268af1e68a0b693b803c8cbf7f0d3669eee6fef7fc0482d7fa3db5b0eeb08ead301838f19cd85de87a5236f90608930a1865cce639d490552da735a92cd6a3017e0a726e8600bd8eb98a7d7024d384b8942e617de3f7006ea8aef1bb6ff518564375f0773af0e3efbb9d520c6e33522b11fe59a5ec6f1d9771ca6a48c395869d50f2fc3dc48aa6f9ce398bf1dc5757aea63ca035e23fc310c005a246b898efc05a53b5e8730435b548edeeaa23582d34760ad8ca938fcad27bed341f446d9f52dcf4b10763c206489ab65c933b50efb29bb6a7c1ce2d6fa5917aaeabaa90c6657dd653314ff0184db49723486957fa8269d3309f5c0a7bffaae9b0708dbc4438c2824fb912d4c31fe023168ddf4bf54bf5ed83954c681d95e34fdbbfc60150c4af32a64619bd11fb8a93c65376ceb7b6009def8e5382fc2e008423ac382ccc3399395f6801aa35d850df2a5c7a3bc482c14bd06d726502168613574bab2a366f9cdc0484f8c5d8f41ff25fe43d5e343ee170ac6ff28a96f929147c862408aecd22b728b2242b9403d46a7a0f2e904370dbeba9f75a936e12194a72cf6aaab36166295da79096d18edbb9bff15269acf5c78f9d3b25a0003b41913c2934218f1d677feab26d677614e523f7ad550d48caf2fa6edbc574d8bfb7adb7cb913a269f5d9c0ccf000a058b3f76c8cc637974ab5913ee49a135189f0b9f72a9fb16a08c4597a31fa789db8c4eda8a7cd1c6c6c61d63b5d073e6713e17183fb6775b7103b02ae61a0a79974a3c23f1d8b4b46f09fa8227e97bd795a63174e2a516bda231a8f4f7f871e93d8e64d3c70de0fa3c22b6203aa6aa0db41d6f6d06949754e5fb0dc3225a78dba0824312d2c648e18415569bc3f0898b9dd331d5a33e94bbfb64471a7249385063015b601d829eb702b732efad5286c470b1bb0a0396e5c191c18b4e4a2ff80822179c96caa7a2ef63478fc7a731ae90f58a2dcd751ff66acff07bc7f6c82c099fcbc8939d9a6c864c911bb115c7118b0ef7df4f6ccb32dbaa99bdef3833667c7ea6e9339f9412e8e8dccc0dd1fefed32ac580d1cd71655339deff1f0c614de6ea618cfa49a5f2185b16872e52469f626c577982f9deda611993cace7b29927a2f0bf463ab7b07671e0cba67fcb4477a2f28c4dadf9c797b29ecd04db367d994254a3d54bd4bfd11400c14d9845402fdd8d878155454ba3532fea505e95d7b6d1da43085fad5e09c90dbd891586ec2867183d22ed298d799b62357fcd1ddbdab772866f8392a0d4c61fc0236a8c5cc347e73958f1c45bf6afaabf08257aefcccacd190e5668dd2aa44630d5bbbbc950a2eb83af3d265c1d95ef023845caff77795157c8db1a27e2aa9a1711827f952c302b8e04529b1930b536f58346349f2b59ee362595e8b5b865c767557e682d6c49e97e16c02fa4ed64a4ef619b56285d052067f40d32feb1259016e9c4a22015e123bf2b9238dc78135b29671d0cfae1587417b71204edc133c0c9e29aa40ae7b29d6a9bc2f3cb53df66ba8c7270cce4d055eaf8da74305fe1672f0be8764acf22330e9bffeb8629d9d95a3c7e93bddde8a17b30292361b80fb40626ad65d33ecab34bc703c623151905106cebb62e869d0ada7d407875d4693a0a58fd65db54341a89d599d5fe7af8e1af0fa2f1aaef9c2e3476c8cfd4feb8db0dc3b28f1bcb0da1c3e9779fdd2b8a552262fb62498358c71cb0dca1b5755fea58be784e62b954ac6eb2fcc466e698ef0cbe3615059b5d46e28fdd7b878a5c2864ef586fa1e736749fd65e0344cfd47d7b4cf87ee9af8ec2b2eac03a5e9a22dda16ad5b53f38b5a8fc3f450c99aab12c4c95564763ba129dacf9053801414125173ac48f24abd1d5690d83c631a76bce9fbc66d00bd1d12131a494042159e0ab2797ab615dfe91286307d0f1ca64fcd15920d1fd54b8763b02b2355f0d0cdb424b3f60e88ae3a25f3aaacd16c972524b61edd8478c762f89f9867eb43c94f6e5ab8f382f2ed0782958887607102772373fe58e7bfe1ea9d8f0d5a959a6127bb92e4754e321887d23b08abb1473272ea32b6b598945eda651a92297d6a8a73848de38e9e88bb19b96e90ada691b50d8946926dc5428192bdb1cf2449c992d065912764b92d84d82969ed353387237341c308a6a483c6cb45082f53e3b2de91504533608c1ce8b9a1272ef111d57f38a2416"}], 0x1148}, 0x8000) sendmsg$nl_crypto(r0, &(0x7f0000002400)={&(0x7f0000002240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000023c0)={&(0x7f0000002280)=@upd={0x118, 0x12, 0x800, 0x70bd29, 0x25dfdbfb, {{'nhpoly1305-avx2\x00'}, [], [], 0x2400}, [{0x8, 0x1, 0x4c}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0xc51}, {0x8, 0x1, 0xd36a}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x800}, {0x8, 0x1, 0x1}]}, 0x118}}, 0x82) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002480)={0x0, r1, 0x0, 0xa, &(0x7f0000002440)='.][@&:\xdc\\$\x00'}, 0x30) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000002580)={'wg0\x00'}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000002900)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002a40)={&(0x7f00000029c0)={0x64, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xf9}]}, 0x64}, 0x1, 0x0, 0x0, 0x20040044}, 0x60004811) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) socket(0x1, 0x80000, 0x5) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffffffffe0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_addrs=@nl=@unspec}) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000ff0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(0x0) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000001840)={0x2a, 0x1}, 0xc) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ff6ffffff0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000000b0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 1: socketpair(0x2b, 0x80000, 0x0, &(0x7f0000000000)) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffeffffff0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@ipv4={[], [], @private}, @private0, @private1, 0x0, 0x0, 0xfffd}) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) syz_init_net_socket$rose(0xb, 0x5, 0x0) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}, 0x1, 0x0, 0x700}, 0x0) 07:57:10 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000001000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TUNSETOWNER(r0, 0x400454cc, 0xee00) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000008000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) 07:57:10 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x42, &(0x7f00000007c0)={@private1}, 0x20) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 2: ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000010001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}, 0x1, 0x0, 0x7}, 0x0) 07:57:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x2, 0x6, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}, @in={0x2, 0x0, @loopback}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x0, @remote}, @in={0x2, 0x0, @remote}}]}, 0x70}}, 0x0) 07:57:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:10 executing program 2: ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:10 executing program 1: pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240)={0x0}) 07:57:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655fffffffffffff070001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000440), 0x8, 0x0) accept(r0, 0x0, 0x0) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 2: ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000440), 0x8, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000200001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 2: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$inet6(r0, 0x0, 0x0) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=0xffffffffffffffff) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000101000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 2: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) 07:57:11 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, 0x0, 0x0, 0x40000060, &(0x7f0000006680)={0x77359400}) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000250000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000201000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80800) 07:57:11 executing program 2: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000003f0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 1: memfd_create(&(0x7f0000000140)='\x01\xba\xc7\xe90W\x8fF', 0x1) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000040201000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, 0x0) 07:57:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000cd80)) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000800400000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x220900, 0x0) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000301000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000005c0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$sock_proto_private(r0, 0x0, 0x0) 07:57:11 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0xc0000, 0x0) 07:57:11 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, 0x0) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000401000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000ffffffffffffff7f0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x228) 07:57:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000440), 0x8, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 07:57:11 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, 0x0) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000501000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000440), 0x8, 0x0) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) 07:57:11 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000005ca51910000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') openat$cgroup_subtree(r0, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) 07:57:11 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000006440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000060, 0x0) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000601000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000001bc00000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) faccessat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000040601000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) 07:57:11 executing program 2: pipe2(&(0x7f000000cd40), 0x80000) 07:57:11 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) openat$cgroup_type(r0, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) 07:57:11 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffffffffffffdef0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000701000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:11 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 07:57:11 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000013000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:11 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200, 0x0) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000fffffff60000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 07:57:12 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$packet(r0, 0x0, 0x0) 07:57:12 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000004ec0)='/dev/net/tun\x00', 0x200200, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000801000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 1: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000fffffffe0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x30000, 0x0) 07:57:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/if_inet6\x00') setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000901000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000001020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000fffffffffffffffe0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@private, @in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xffffffffffffff3e) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000a01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept$inet6(r0, 0x0, 0x0) 07:57:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/62, 0x3e}], 0x2}, 0x840) write(r1, &(0x7f0000000100)='B', 0x1) 07:57:12 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000025000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000023d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt(r0, 0x6, 0x4, &(0x7f0000000000)="8d361f28", 0x4) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000b01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 2: open(&(0x7f00000001c0)='./file1\x00', 0x20200, 0x0) link(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0\x00') 07:57:12 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000023e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000c01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000007ffffffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) dup(r0) 07:57:12 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000040)=0x2) 07:57:12 executing program 1: semget(0x0, 0x2, 0x38a) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) poll(&(0x7f0000000200)=[{r2}], 0x1, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000d01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x402, 0x0) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000effdffffffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1}, 0x2) write(r1, &(0x7f0000000100)='B', 0x1) 07:57:12 executing program 2: open(&(0x7f0000000000)='.\x00', 0xa30, 0x0) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000023f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=""/4096, 0x1000}, 0x0) write(r1, &(0x7f0000000100)='B', 0x1) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000e01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000007fffffffffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100000000}) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000001280), 0x8) 07:57:12 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000001001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000feffffffffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1a, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 07:57:12 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x812, r0, 0x0) 07:57:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x7ffffffd}, 0x10) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000001101000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000ffffffffffffffff0000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000004c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 3: pipe2(0x0, 0x0) syz_emit_ethernet(0xad, &(0x7f0000000140)=ANY=[], 0x0) 07:57:12 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5, 0x10, r0, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000001201000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 1: syz_emit_ethernet(0x4f, &(0x7f00000001c0)={@random="1cb1207f846a", @remote, @val, {@generic={0x0, "972fbf6a54029726bec652a90b0f6398e6eebc37fab413618bd04a282095677e68f18536e63893877bb2ebd6992d6c9a05504dd4b68860ef96f53f1ec4d9f8e8bb"}}}, 0x0) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=""/4096, 0x1000}, 0x0) write(r1, &(0x7f0000000100)="420d5e1d73cc131b8c71dd51a3d5fa3040e29e27b4340df0bfbf897308a24844acbd1d8b53dc31d7f0c0ca26b7200648f1f83a33eaa2e62e6cf56cb3aa58965bf67cd52de1cb3861f8df4cf41bfc0f6edeb670703dc600bceefe9265a381ea30442ae3cf4ce9fc0bccfb522909546e5789062c4f2d4f0ad1ab4020ac553d4355bed0469a64954d86a66384effad64f47fc", 0x91) 07:57:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000005c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:12 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 07:57:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000001801000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:12 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) fcntl$lock(r0, 0x10, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000001019a55c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r1 = dup(r0) flock(r1, 0x5) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000002501000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) poll(&(0x7f0000000040)=[{r0, 0x1}], 0x1, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x2) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000000c0), 0x8) 07:57:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) flock(r0, 0x5) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000003f01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x812, r0, 0x0) 07:57:13 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) dup2(r2, r0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x2) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000068000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000008004001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0xffff, 0x8, &(0x7f0000000000), 0x0) 07:57:13 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000006a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0xffff, 0x4, 0x0, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100000000}) flock(r0, 0x1) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000005c01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000008001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r1) 07:57:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0xffff, 0x8, 0x0, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000074000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1}, 0x840) write(r1, &(0x7f0000000100)='B', 0x1) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x100) 07:57:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x10000, 0x60) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000000000a8001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000b0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000385000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x300282, 0x1) 07:57:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000700)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x80000) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000fffffff601000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 1: stat(&(0x7f00000003c0)='.\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfe12, 0x0, 0x3}, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000388000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000fffffffe01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000002100)='./file0\x00', 0x6000, 0x45) 07:57:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x284240, 0x30) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ffffff8c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000030c0)) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffffffffffffffffe01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x66) 07:57:13 executing program 1: open$dir(&(0x7f0000000140)='./file0\x00', 0x20140, 0x8) 07:57:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') write$9p(r0, 0x0, 0x0) 07:57:13 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000000000ff01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:13 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 07:57:13 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000002690000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0xa50) 07:57:14 executing program 3: semget(0x1, 0x0, 0x5) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000ffffffff01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003a6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 2: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000000)={{0x1, 0xee01, 0xee00, 0xee01, 0xee01}}) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x134) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x61000030) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0007ffffffffffff01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003a7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x204840, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) utimensat(r1, 0x0, 0x0, 0x0) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003a8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655ffeffffffffffffff01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x400, 0x1) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003a9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2a2201, 0x0) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x5000cb5) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655fffffffffffffffff01000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x34d341, 0x5c) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000250000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa0100, 0x30) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000200000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000055aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4b5902, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000005c0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 3: pipe2$9p(&(0x7f00000033c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80800, 0x108) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003ab000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fe0000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000300000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0xbc000, 0x0) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/148, 0x94) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000a44) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0xea60}}, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000040200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000400000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003ad000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 3: setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0xb8f7b5b66228dbfb) 07:57:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "54829862e23ce41855e2b264819352feb68216c8ba11f55f9c783a856b"}, 0xffffffffffffff72) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/138, 0x8a) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000500000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003ae000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xac0, 0x0) 07:57:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x8000, 0xc0) 07:57:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000020400000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000600000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003af000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x1219c1, 0x0) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000060400000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 2: semget$private(0x0, 0x3, 0x414) 07:57:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000700000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0), 0x0, 0x40840, 0x0, 0x0) 07:57:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000300)=""/129, 0x81) 07:57:14 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:14 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:14 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 07:57:14 executing program 1: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x1) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000800000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 3: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, 0x0, 0x0) 07:57:15 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x4000, 0x0) 07:57:15 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write(r1, &(0x7f0000000040)="12", 0x1) close(r0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003b1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000900000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000040600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0xa50) inotify_rm_watch(r0, r1) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x54000, 0xc) 07:57:15 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x500, 0x0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003b2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000a00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 3: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, 0x0, 0x0) 07:57:15 executing program 2: semget$private(0x0, 0x3, 0x67) 07:57:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000b00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0)="c2", 0x1, 0x40840, 0x0, 0x0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self\x00', 0x410100, 0x0) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000c00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 1: timer_create(0x0, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x121400, 0x10) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000001c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000d00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x102) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001140)='/proc/self\x00', 0x20000, 0x0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000edc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, 0x0, 0xffffff99) 07:57:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/77, 0x4d) 07:57:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2049c1, 0x0) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000e00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000001c1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 3: timer_create(0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) 07:57:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) 07:57:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x59) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000001c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 3: syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 07:57:15 executing program 2: openat(0xffffffffffffffff, &(0x7f0000001680)='./file0/file0\x00', 0x0, 0x0) 07:57:15 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x1}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001100000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ff9000/0x2000)=nil) shmat(r0, &(0x7f0000ff4000/0xc000)=nil, 0x0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001200000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0x5450, 0x0) 07:57:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000003d2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1691.801174][ T3437] usb 2-1: new high-speed USB device number 54 using dummy_hcd 07:57:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x30, 0x9, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}]}, 0x30}}, 0x0) 07:57:16 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1692.001142][ T3437] usb 2-1: device descriptor read/64, error 18 [ 1692.271185][ T3437] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 1692.471188][ T3437] usb 2-1: device descriptor read/64, error 18 [ 1692.591316][ T3437] usb usb2-port1: attempt power cycle [ 1693.311206][ T3437] usb 2-1: new high-speed USB device number 56 using dummy_hcd [ 1693.421689][ T3437] usb 2-1: Invalid ep0 maxpacket: 0 [ 1693.581158][ T3437] usb 2-1: new high-speed USB device number 57 using dummy_hcd [ 1693.682313][ T3437] usb 2-1: Invalid ep0 maxpacket: 0 [ 1693.687717][ T3437] usb usb2-port1: unable to enumerate USB device 07:57:18 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 07:57:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f001800000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:18 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000026db000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:18 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000fc0)="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", 0xec8}, {0x0}], 0x2}}], 0x2, 0x0) 07:57:18 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000c01b00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000000140)="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", 0x5ad, 0x0, &(0x7f0000001180)={0xa, 0x4e22, 0x0, @dev}, 0x1c) 07:57:18 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)="62201e715186b518e84d4e0bf175ddbb1e2e9c2fbe5c67d0e2ec30cb2885d8747afce492d7d2c64f69d5eb81ec15ae38fb2aa065266601", 0x37}, {&(0x7f0000000300)="9c0ebe0cdbc1c8df31749c73c6ea14def95655ed5294cc8522f506e1c5a43544521120e7f6219bab7c0b88ad9885350390abfde6f3bfa1880f01d30bc6bbdc6c0a0dd6f12db6278a8938bdf3127c4af3f11121041bb0aa06c77b4cf6f9dd66def163ae748bac51aca29c3ca4a2537653d078420959a0d87e14cce740390377d5057da86b454d1160ce613a676e6618c09c59bfa167ef568c39e634c3c058c3187e92d7076748af2e6f68e20ed11372750f5185d8e2dd6ae83340776617a426cb8b3b8e8915abb3fc4f7ce8d41db8aa53d5adcbeb7c805e43bc234bbb056951fd6d63b189db7a8aef7224", 0xea}, {&(0x7f0000000480)="68ef55511bfc1eb0af3a11b97dd720f9c535dd4b217b5b850c46d8b4da0e7fb0462721a669dec9829caf861eadeb0f5f46dcfcb60601091b11af1d9af55e9eb36f7012a20329def9e4dd12f0b9d20d28771976cb43b7fe6da43d8bb83a1cc151e10512ffc0f0528cdeaf8fb81b328d69c265e98e9cd5e6704eb6ac999f4afa08bd4ad6ee11be739e2c2999a6dd6e80eafa7b1dfa9bea74488fb7c331a77149d8c27c926e0ab7af2ee7cadf249b3ad7a90205b4398e9b87944d1f0d794dbe2c693f150fb49f04340db17f7bc9377f556418d81ef74e034f3285530fc8724f19d3", 0xe0}], 0x3) 07:57:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f002500000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:18 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000002340)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x3, {0x9}}}]}}]}}, 0x0) 07:57:18 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000026e8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:18 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000d80)="b452016173f8012ce200", 0xa) 07:57:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x410f9c5d5fe08be2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f005c00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:18 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000026e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:18 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000380)={'team0\x00', @ifru_data=0x0}) 07:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 07:57:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00fe00000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:19 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffff6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1694.941177][T13574] usb 4-1: new high-speed USB device number 96 using dummy_hcd [ 1695.141228][T13574] usb 4-1: device descriptor read/64, error 18 [ 1695.431163][T13574] usb 4-1: new high-speed USB device number 97 using dummy_hcd [ 1695.621581][T13574] usb 4-1: device descriptor read/64, error 18 [ 1695.751225][T13574] usb usb4-port1: attempt power cycle [ 1696.471197][T13574] usb 4-1: new high-speed USB device number 98 using dummy_hcd [ 1696.561485][T13574] usb 4-1: Invalid ep0 maxpacket: 0 [ 1696.721172][T13574] usb 4-1: new high-speed USB device number 99 using dummy_hcd [ 1696.821684][T13574] usb 4-1: Invalid ep0 maxpacket: 0 [ 1696.827876][T13574] usb usb4-port1: unable to enumerate USB device 07:57:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000093c0)=[{0x0, 0x0, 0x0}, {&(0x7f0000001700)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002f80)}], 0x2, 0x0) 07:57:21 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000003f00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:57:21 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffdf9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000402000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000380)={'team0\x00', @ifru_data=0x0}) 07:57:21 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffffb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:21 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000005c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000380)={'team0\x00', @ifru_data=0x0}) 07:57:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_WOL_SOPASS={0x4}]}, 0x18}}, 0x0) 07:57:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000003000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x200, 0x4) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}, 0x0) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000088000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000204000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffdfd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000380)={'team0\x00', @ifru_data=0x0}) 07:57:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000580)) 07:57:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005580)={0x0, 0x0, &(0x7f0000005540)={&(0x7f00000063c0)=ANY=[@ANYBLOB="04b20000300001002abd7000fddbdf2500000000b42501"], 0xb204}}, 0x0) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000001bc000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "31b43b", 0x8, 0x0, 0x0, @empty, @rand_addr=' \x01\x00', {[@fragment={0x0, 0x0, 0x1, 0x0, 0x0, 0x19}]}}}}}, 0x0) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000604000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1, 0x9, 0x6}, 0x40) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffffe000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1697.934446][ T7733] netlink: 35900 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1697.945622][ T7733] netlink: 9648 bytes leftover after parsing attributes in process `syz-executor.2'. 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fdef00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 2: syz_emit_ethernet(0x2b5, &(0x7f0000000200)=ANY=[@ANYBLOB="a195076b4e7affffffffffff86dd64cba35b027f2ffffe80000000000000000000000000003bfc0000000000000000000000000000010601"], 0x0) 07:57:22 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg(r0, &(0x7f000000ab00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003640)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-neon\x00'}, 0x80, 0x0}}], 0x2, 0x0) 07:57:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x12, &(0x7f0000000100)={r2, @dev, @broadcast}, 0xc) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000005000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a195076b4e7a", @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @rand_addr, @multicast, @empty}}}}, 0x0) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000effd00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000300)=0x7, 0x4) 07:57:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x37}}, 0xc) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000fff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000006000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f0000001140)='syzkaller\x00', 0x1, 0xd1, &(0x7f0000001180)=""/209, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, 0x0) 07:57:22 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000004e00)={@multicast, @multicast, @void, {@ipv4={0x800, @gre={{0x2a, 0x4, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @rand_addr, {[@cipso={0x86, 0x35, 0x0, [{0x0, 0xd, "5ad41b17153478526379fb"}, {0x0, 0x12, "30c00ba33b583a6f8654df4f96bc889d"}, {0x0, 0xb, "b7a3b6edc20a89b045"}, {0x0, 0x3, 'O'}, {0x0, 0x2}]}, @generic={0x0, 0x6, "a4a807a8"}, @timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{}, {@remote}, {@multicast2}, {@local}]}, @lsrr={0x83, 0xb, 0x0, [@multicast1, @empty]}, @ssrr={0x89, 0x27, 0x0, [@dev, @multicast1, @private, @multicast1, @rand_addr, @local, @broadcast, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}}, 0x0) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffe00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffffdff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000406000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xffba}}, 0x24000009) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000004e9d0000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x40, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890b, &(0x7f00000002c0)={0x0, {}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, {0x2, 0x0, @private}, 0xb3}) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/229, 0xe5}, {&(0x7f0000000200)=""/191, 0xbf}, {}, {&(0x7f00000002c0)=""/52, 0x34}], 0x4}, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800, @rand_addr=0x64010101}, 0x10) 07:57:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000440)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 07:57:22 executing program 3: syz_genetlink_get_family_id$ipvs(0xfffffffffffffffe, 0xffffffffffffffff) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000f9fdffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000007000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000feff00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 07:57:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000009000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:22 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6, 0x7, 0x8, 0x40, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) 07:57:22 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fdfdffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0x4, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0x3) 07:57:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) 07:57:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000a000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000400008000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fffdffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80) 07:57:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={r2, @dev, @broadcast}, 0xc) 07:57:23 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local={0x0}, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @multicast2}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}, 0x0) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000001540)={@link_local, @link_local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010102, @dev}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00800a000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:23 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000000)="a985055be2ac2e9e251fdc367749135c54356afc14bff3b2d2f88c3a62a1c031", 0x20) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000008cffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x3f4f}, 0x40) 07:57:23 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 07:57:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000b000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000f6ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000007ffff0000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4000000, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) 07:57:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xc8}]}, 0x10) 07:57:23 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000001240)={@multicast, @remote, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "55b727", 0x50, 0x11, 0x0, @local, @local, {[@dstopts], {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "79c71735718265178f1f650c1b23137defb4608114aa2df1", "f47952ab697da010d222eb8e3d9ce4d53a71ac4926e085c3e72569e16eae4992"}}}}}}}, 0x0) 07:57:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000c000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000fbffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000100)={0x7, 'vlan0\x00', {0x7f}}) 07:57:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0x3, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:23 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000feffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000d000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:23 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000fc0)="c10e0000f127488421338cb7fabcd2c34aeb6100c93ab1c5b8760c364510b11de127cb62c28ac2d0c020bdb7b7493364cc4b94e00bb08856024c7501b40b00d0b12747686d8fb5a90ef9dcb16ab14edf8e126ccbee62205db69f6908059d300c1d41ae65a1d0e65902296c24d42b7c298be2b4efb47bdb3008424e3f76e44df6885002cab436e4a2cda8c5f09ace5e67c8bd51fa80ece22025d53842861d6b23214bbdef069575ee4880b124248cc78e5a27dcfc70f26c574f890fce7d74587d20435054bb20ea99683583711ac9d424616778c752ce0a3c29a4e4409946abc799fa088086e0adad51a1ff64f6c4144626db67120ce1f805a7f05c2cc165a0317eca69f31cf39335aa4195939b662998ffbaa96e9847fca81511ae2335f25e2c3404b66e176310c10496c4504b1f95fbf2355000eb30a6338debf10a215ef7336c8722e7dbe5a51f42df8a6d81e5215616b3c0d851a6b9a9fc8f59d69ddc768162f80cc2d842b14bdb8520c3a89cd8c96763e2817f61fe6631416a55d76b6f94ebe371705d2affc3dc88a30802d691ada6b0820fee6a4592a31286fd4ba1d4609aae7fc52c27f888e86ef43cd4ae7f83b644c1cf7c449640dfd58a07a547412956036c87a57b0378105a1c50fe2bf8b21ef462c73b2608a0fd38270c1e0b6e8357cb962a2623886c1a4d8fd6dbdc5777d52b784676c336b23224ad5469c17568224b2e1c0e3da396d18a14f84f1a1f2325a4f2061637c0c3a017b0e846c7b705c504857d6e3c83d6df337314002a71b0f7a5b25236dc5fa169c5e525b0e7253058d3950ef52a1fe7ac18cad1e5e86d403f9a7c07f5eaf76e60acce20f36043b86f4e58b2ff992adbdd894754936fa0c16cc4f8d6fc8a086ac1e7bb66d359bab9f032c6a40c4131be86eff8229e0bcf3ce080c37d20e68101105289581403a742d5ee19ef9ea414548b80c4f0ae99806272067a6d274d85ae285277fad904ba9cc465a963a0629d996a4cfa5e332170cd0c0af3200380ac0cba5f9993344c22800320be16fe1fc8d548c228c2da7c733741a8c616170843ae42528f16f347ff78c3921b7fdbebb27e32e348d1e03050d090fe489e0e7a94f320e059916ca7973f6776f8ad2700d129f92388cab11aeb196d3dccd84b7879ad7ac4730d5bacf10babff253933e38ab0426929dbeac42e4c0cc0e5a1efee30c7d808448c368519ec0aa98e98fb891fa1aff6406a871cf8437318bcf0f9fc423fec8bad7c46f19bd4c5223310390c4c0d01863807856855adef4133b1d4b375bfaa78fa1981953e3bc302689f63c606c3e09ac00a3e3559bdf696c66a95584e11e3e55661cd241ae35b7fc953b0d898603349151f97b1cd2200a6e728c49ec9cedad5a1d2caa3b55cb07e7b514b024488945e679c6ac6fac830852fad8044b16ce8cec07363afdd0ee5c06df23d0f912c1c378f63c572cab6bc856298c3722c9154bdeaed19225aa7d3fd85ed1a11f3a54d3d3157bc645ab633c93e33d32fa0ce612130a7d6209e42e50368f2fbd4e593fb0a9a4fe9b224c73623469cfc6995bcd4f0bd939d5f2d50973adcf4df93850152ec0194a656a93f90fdafa4cfbc4dc0b95fde86313f22bd47f9962a2d7dd22173609faea7b8a2937a787569ed98aeb5d3e6ace8eeab99ad81844f29dbf49a21d77449df02eed67ed63f0a5e895a346770afbbb36b81edc90c4e48c504c0332b9a2b3ae9d06de586a75455c6ddb9435a48efafe879526bbe54c64af36af65d50bed2f740dd9adf95dc74fc9b38cc0454db1eb77b9f1109cfb64975ce5294983decacbf6f0ce4115015602e9540c2bdb97e943168687f0f8e1c66e802fa600c96de4e1c1e0f89ef67b2c71d896dc61dad05e7d066a4dee55dd6f2e03c529c04e99189e40b234a57dfebab197ffa3f8227e58a208e96e92be75a51a32287afe7c8a01dc19ec4ed2fbd4edfd9ea6e7386a5e2ab7e6e3b3e9610b589abd7a5a1e546e3422a90a11c588ffb13d1e2a3a62a4ce5e76dfb5a99c34d93a0b1a84c7748f11ffdc296ad1cf7a56d67263f170bbb732a1c017f651cdae12864d806e7a9fce35db01943d064c560e2c83e42c1460020b648a780da6c42aba9da648ed329c644e080f63551ceff5b0088771fa6dfb507c8b8ec78d61cd6a39844135f623f90e4ef9b29f5b1f9cfff657cb30b26a0a57c23430d8c9427c76dcfdeb3de6ed823f10293b3c91a36a20f34038eada1c42fe76b8021e6c1c5e59fe52d18698bb14fb20c6d833a2c9ea715e306a060800409edb851fd47ba01583da0589e578e8c6b9f5e74eee50160a0e86cbce96694b3413c858b0adac01f9502bad4ccf4fc6219d4e213023bd396f4cadaf3bd7f06466f466714e901b03f5e3d936305cdb6893925577f3656ad7e60f971d93cae11e2341de1dc905ff5da6d8fe0495b05d29c0d0d5f2bb0a7d60f5c6bdfd709a8c23469b5433b364a82f3210c5979f36bbf9367738056f64f397dffbd241e44512781df992b8c68e5e0ea7c81df4fb1521441018c7c1298ef67ad9bace3a2a29dba96a60094aa4f94779ec3db4dae42b7cb5acb40a75d2cdefa79ae6fc124a59197b1326be1b17c2d1b86f5f7d57ff6f9a3fe14eeb962c1fe80a15bc213e2c950358f062ad0c3e9234c356d5d5f58d4f2f51942f69a77c10a2ccc516d9dceeede1a4b45e93390dd576510eebc4e55bfe4c7a14a1f8ba2a91a64b08647c9d85d3aba190f1fbbb379a71ab8f3cbbcba30101b0b2f01d04b1f0d4b071f4ae9ade3000c39b11fb0770dcc40d966ba4b14fbc45ef9abd43aa37a554d2498bb6fba34ca795942efb8dd9aece56c2012f48aaeae49a77b4df76ecbd866db831d202a5b9711e9e04d5bee5150e8fcca925dd5c691c96f72fe96ed221502d890e9e8068ec85ecfb42ba97d92fe0c418fc311bba98a46b67a03b0adee20f83cfea6a48bf003fecc7b82884fde074b3c25574a25b378bb5ef613ebd7e6cdfc1be1f57f4c9f9dd85806dda6a6db971b5644f30727412b8fc574f5c6f9b99a1d1c34d3da1364fb939b966539a7035531f439204c50ac5cb73d3d487de759f88e081f23c0dd0261a9f688b5a0ac886adf4a4f6c74e241e9eb0acc1b8c3feda545c1ced7d25d1bb11425f8e753cd93d90ea344bfa28804718c77d910949f5d0e2de0c2d377357a90789f35315f457e3b74e22753903bae312c932d2402bb196e82da36fb05b20ab5f4b9eee361e16f7c17c519168125f712214b0f37cd9145ffcf48f63b6c9984d873fe8d54db274d18f06f687133440b61656bdd14575925680d68ad6e9a1a636bbfaf6cbd3ee7f770131a49581f98f7af97653ffcd97e9e17844bf949768e77dafa9af822a054bdc7b8789cc145309fb3ded9e483ef3f964245b6032796a9c4fcc135c608a0168d3038e1f881811ccb2f565fdb3ec26586fecedf63fa45f1e2440eeaa81ef9f915747e83fff5a2b7d6a560bde4411861ab090b3b0d634e3d327779f2359cdf75623adbb31f2e30a64f11cb571b925e14d7c0a65f11e28d91671ebdd2610ca071f6c31f1b9d112837194231c2bfc0d3095fe2ebfb29f12ced76694a3cb2e9d77c63332676a6f3b536c226c023babe2f80eeba83360f02c46426044bd26ac0afdb5e85d93503414f685de2d21ed3c7f7557c9a3d882bd72c680e85baa75b96f2f1450bd42e7aa1f949c8ac133afd642c0abf5e4b963769837a30099977b39bea2acf86134fde571f3d1f404a6c998e0fc269bfa0496184c7d3f9fe8393058e01813da284d47914e23f340bb23c3976b68e36866d37879c0d7220c9fcd1e1648da16dd23af437ae1ff96a9da304fd94f6e0c6118f5f797e424254affd679a8be8f3f8c660502e148b9069c23dede7fb96980f80560f87fa4194a2e2ac61bc543a626909b4df805d323aed1e5cfa1adef4fa6a85cc3f3f5dee2a98c239b9785f6d5c733f2d3b689ed36dd6627417583e28c521a8f4f54d7850d1e7d74bb80a0d8cc35afc5dc8f5b28bc8d6b37b24e2ff5f0dea8b659b087b76caf8d682084f330c7591f17c64dbbb13db993b18e8cb5d520b5fc8e50a29805303febc65021e5e459b86d62465adb98f7b8d5154a9af812c2f2a9ecf0a8a4af0a415933fd7c074b65ddb592f08ba95c9d3355e6961a75ce726e94b0b3143142e46abf3bb1ff9785eaefe49a0b68fa6350421b72f3bcebae22cb8f21e343ead3d97d464379b269de8b3a87f892c20beafe1f53389e2ea89cb7f363e7c6377c5be4f8c2bf803f6871124c947614f9108160cc3f94188a07fbac16038e818d9c64f157ffb08041914d7096ee808cb34e214c5d0f9801dfb90c018667f7a3a9fb7dc06e54f54a9b337b38b00fd5b14237d1e9fe2b32e664b69216383005c6eaa8344f2e79385dd31837156d109a702ac31b2900c2a9841c8233c6c587ceda65608a88944e477cbd2a3dab53e863e8cfddfb6162abfe020c14ddf33550a0d3467711db57fd824bf695e5c8bb504d4d34cdab34e86e8b2129fb8ca33f718e25adfe6fed758ef05c5f79a4e2d32bd7a85d33c5ef7f3bf2db88426821d0c4ae0d81f1221650dba2fe3d7b8e5b2b3cc41fc8c5eeb5dd81fd1d12a3660517348c8ebb1e891a8e078c68e70ec0b0821ba13f6785a05f25b3f67317aad1548aa367fe8ec9e7a37d6bfcb23ec2d2027939b2c20c6f9bfb9b2220005990ff59e1afe47814a76246975cd601ba9e484b9dfc6cfa94e2a4845c9223d3ba54ad0c30b570ce20e6511c1828e14eaba85cb8b6d37e0dcccddbd3110438e9fbb267ddbdb9d48e7609b5b4b5345e310a0367fb0ab85b855442a757febb9fbcf09fb69fb5e337b8b044db09eed7577eb2e4d103a30b3d303e7f33af468fbfd07bec96c47171b9fdd4ec3a5ab2408f00245ab2d5b25747dbe15f2c1971271d8d1234aa5aef518c8a30527405db459c14c16c9c109f431af8e91af8eaeb76264de6404e8105183d6cc477c0200f017f79245e0933baba25082807abbc6074ad96eea5813f4542ceb560aa7a0b0e5165f61a9d85b1491", 0xdfb}, {&(0x7f0000000280)="c1ca6ea44c0389c9bb953c915a6937647189544b09123bf325fe7baaaae14905b2c735b12c347df1c47750859adc60cb2744ffac531ddd79e7b11cd23faeb1422215be823f1754f9e1eed8bf85261a3bfefba86a148eea", 0x57}, {&(0x7f0000000300)="dff3e1b82e9076ec58cfdfd947f70a5dd01f8f366b695c94676d3660b9db69cbe42a1318202a213685bf09f8b4b554e3b070e6134c529ff5d29f098723dcc2d0d7e6c3424a750a7718b4c2f20d55e97bf1e1f6357bc6826f241e09d2b478a2500d04f10b470ae033287aaacb6faa54", 0x6f}], 0x3}}], 0x1, 0x0) 07:57:23 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:23 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="b568b8e9cfeae511062a754850cd6d", 0xf}, {0x0}, {&(0x7f00000003c0)="8f", 0x1}], 0x3}}], 0xffffff1f, 0x0) 07:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0xc, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000180)) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000e000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000004020000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x2000}, 0x4) 07:57:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'macvtap0\x00', {0x2, 0x0, @empty}}) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000aa5500000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a195076b4e7a", @broadcast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @loopback=0x64010102, @empty, @rand_addr=0x64010102}}}}, 0x0) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000011000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000c0ed00000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000022c0)) 07:57:24 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x12, 0x0, &(0x7f0000000100)) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000012000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast2=0x7f000001}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0xd, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ffffffffffff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000018000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x0, @dev}}) 07:57:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0xb, 0x0, 0x0) 07:57:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x4, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000080)={@random="a195076b3a6a", @multicast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000020000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x3}]}]}}, &(0x7f0000000440)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000004060000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000025000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000e010000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 1: socketpair(0x10, 0x2, 0x0, &(0x7f0000000140)) 07:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0x28, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:24 executing program 2: syz_emit_ethernet(0xb6, &(0x7f0000000140)={@link_local, @multicast, @void, {@ipv4={0x800, @tcp={{0x25, 0x4, 0x0, 0x0, 0xa8, 0x0, 0x0, 0x0, 0x2c, 0x0, @multicast2, @empty, {[@lsrr={0x83, 0x13, 0x0, [@empty, @rand_addr, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x0, 0xe, "ffb4029cf311c45e3aa707bf"}, @rr={0x7, 0xb, 0x0, [@broadcast, @multicast1]}, @timestamp_prespec={0x44, 0x4}, @cipso={0x86, 0x4d, 0x0, [{0x0, 0x5, "193617"}, {0x0, 0x7, "83ce173022"}, {0x0, 0xe, "6d537b6c87901ba3dc39d326"}, {0x0, 0x2}, {0x0, 0x7, "c7011bb545"}, {0x0, 0x8, "8aaa22ed2c8e"}, {0x0, 0xd, "b6cb726daa1cdc9996ffea"}, {0x0, 0xf, "de8a85d85b25c9e1162cd8c0a7"}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x1, 0x9, 0x6}, 0x40) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00003f000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x88, 0x8, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x80108906, 0x0) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000004020000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 1: syz_emit_ethernet(0x22, &(0x7f0000000340)={@random="0387619200", @multicast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}}}}}, 0x0) 07:57:24 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000080080000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00005c000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000400)=""/207, 0x32, 0xcf, 0x1}, 0x20) 07:57:24 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) 07:57:25 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "31b43b", 0x8, 0x0, 0x0, @empty, @rand_addr=' \x01\x00', {[], "df88217c14878783"}}}}}, 0x0) 07:57:25 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:25 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x7) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000200000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080)="7f", 0x2) 07:57:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000a80000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 07:57:25 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:25 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a195076b4e7a", @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @rand_addr=0x64010101, @multicast, @empty}}}}, 0x0) 07:57:25 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:25 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00fffe000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x7) 07:57:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x15, &(0x7f0000000000)={@multicast1, @empty}, 0x8) 07:57:25 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000b0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:25 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000ff000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:25 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x4c, 0x13, 0x709}, 0x4c}}, 0x0) 07:57:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x4, 0x0, 0xba, 0x0, 0x1}, 0x40) 07:57:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000400)=""/219, 0x26, 0xdb, 0x1}, 0x20) 07:57:25 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000004060000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:25 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x7, 0xff, &(0x7f00000001c0)=""/255, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:26 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:26 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @empty}, {0x0, @dev}, 0x2a, {}, 'veth0_to_batadv\x00'}) 07:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4020940d, &(0x7f0000000000)={'geneve0\x00', {0x2, 0x0, @remote}}) 07:57:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00feff000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:26 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0), 0x8) 07:57:26 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:26 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:26 executing program 1: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@multicast, @multicast, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast, {[@generic={0x94, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:57:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 07:57:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000080000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x19, &(0x7f0000000100)={r2, @dev, @broadcast}, 0xc) 07:57:26 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:26 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:26 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 07:57:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f004000080000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}, 0x0) 07:57:26 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:26 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) sendmmsg$inet(r0, &(0x7f0000000c00)=[{{&(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10, 0x0}}], 0x1, 0x0) 07:57:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000200000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000100)={0x8, 'vlan0\x00'}) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 2: socket(0xa, 0x0, 0xd714) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 1: syz_emit_ethernet(0x1df, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb86dd6e"], 0x0) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000100000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @empty, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @multicast1}, "774a445bb15d4d0c"}}}}, 0x0) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000200000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 2: syz_emit_ethernet(0xb6, &(0x7f0000000140)={@link_local, @multicast, @void, {@ipv4={0x800, @tcp={{0x25, 0x4, 0x0, 0x0, 0xa8, 0x0, 0x700, 0x0, 0x6, 0x0, @multicast2, @empty, {[@lsrr={0x83, 0x13, 0x0, [@empty, @rand_addr, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x0, 0xe, "ffb4029cf311c45e3aa707bf"}, @rr={0x7, 0xb, 0x0, [@broadcast, @multicast1]}, @timestamp_prespec={0x44, 0x4}, @cipso={0x86, 0x4d, 0x0, [{0x0, 0x5, "193617"}, {0x0, 0x7, "83ce173022"}, {0x0, 0xe, "6d537b6c87901ba3dc39d326"}, {0x0, 0x2}, {0x0, 0x7, "c7011bb545"}, {0x0, 0x8, "8aaa22ed2c8e"}, {0x0, 0xd, "b6cb726daa1cdc9996ffea"}, {0x0, 0xf, "de8a85d85b25c9e1162cd8c0a7"}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:57:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000d8000000d80000000b0000000a00000008000004"], &(0x7f0000000100)=""/166, 0xfb, 0xa6, 0x1}, 0x20) 07:57:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 07:57:27 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="b568b8e9cfeae511062a754850cd6d", 0xf}, {0x0}, {&(0x7f00000003c0)="8f", 0x1}], 0x3}}], 0x200003c1, 0x0) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000250000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x2, 0x0, &(0x7f0000000140)) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000d0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000040200000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000003f0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000300000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="b568b8e9cfeae511062a754850cd6d", 0xf}, {0x0}, {&(0x7f00000003c0)="8f", 0x1}], 0x3}}], 0x200003c1, 0x0) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000800400000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, 0x0) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000400000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000003c0), 0x8) 07:57:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8916, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x0, {0x2, 0x0, @broadcast}, 'batadv0\x00'}) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000005c0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="b568b8e9cfeae511062a754850cd6d", 0xf}, {0x0}, {&(0x7f00000003c0)="8f", 0x1}], 0x3}}], 0x200003c1, 0x0) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000500000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3}}]}}, &(0x7f0000000400)=""/207, 0x32, 0xcf, 0x1}, 0x20) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000f0ff7f0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000600000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000001540)={@link_local, @link_local, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010102, @dev, {[@ra={0x94, 0x4}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 07:57:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000002500)={&(0x7f00000003c0)={0x2, 0x4e22, @dev}, 0x10, 0x0, 0x0, &(0x7f0000004d00)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:27 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="b568b8e9cfeae511062a754850cd6d", 0xf}, {0x0}, {&(0x7f00000003c0)="8f", 0x1}], 0x3}}], 0x200003c1, 0x0) 07:57:27 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000001bc00000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:27 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)) 07:57:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000040600000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bind$vsock_stream(r0, 0x0, 0x0) 07:57:27 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000120000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffffdef0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000300)={@random="a195076b3a6a", @multicast, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}]}}}}}}, 0x0) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000700000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 2: syz_genetlink_get_family_id$wireguard(0xffffffffffffffff, 0xffffffffffffffff) 07:57:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040), 0x4) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffffff60000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 1: syz_emit_ethernet(0x72, &(0x7f0000001540)={@link_local, @link_local, @void, {@ipv4={0x800, @igmp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @dev, {[@ra={0x94, 0x4}, @rr={0x7, 0x3}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000800000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, r2}, 0xc) 07:57:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x11, 0x66, &(0x7f0000000100)={0x0, @dev, @broadcast}, 0xc) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000900000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffffffe0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="b1391c62993dcd673c4fcd01095b247d", 0x10) 07:57:28 executing program 3: syz_emit_ethernet(0x8a, &(0x7f00000001c0)={@link_local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '^if', 0x54, 0x11, 0x0, @private0, @local, {[], {0x0, 0x0, 0x54, 0x0, @opaque="9c5f1f5b1726a2e214bc45d2d0c7c322b10f327e057b929a5da0492b6a764dc1bad0feeed4e3ef81433668a925fed6921d8a5b0781e13614a2c8dfd9fe68984f2d802d4ed53bf63e302ae9bd"}}}}}}, 0x0) 07:57:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x2001, 0x0, 0x0) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000a00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000010200000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x0, {0x2, 0x0, @broadcast}, 'batadv0\x00'}) 07:57:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000100)={0x9, 'vlan0\x00'}) 07:57:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000001540)={@link_local, @link_local, @void, {@ipv4={0x800, @igmp={{0x7, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x20}, {[@end, @ra={0x94, 0x4}]}}, {0x11, 0x0, 0x0, @local, "2767388e"}}}}}, 0x0) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000250000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000b00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@multicast, @random="9efc78a361a1", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "a255b8", 0x30, 0x0, 0x0, @private0, @rand_addr=' \x01\x00', {[@hopopts={0x0, 0x4, [], [@hao={0xc9, 0x10, @private0}, @hao={0xc9, 0x10, @local}]}]}}}}}, 0x0) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000effdffff0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89ee, &(0x7f0000000000)="809fa9d41027b799c51132fe6ac2f2275ea1666631490732560a39a887940448704d44f8bef4a254573515cb70b95a61d833622ca6c3d17d01691acfd88ba41eddc3d2c1dc405d9e265748fb1fa61aa5ca9578d861b9be88a89ae23833bb4c9b21c5d9dd59da33c0c6e9ee23da4c7c47ebdc4ef878a20a62acad615d54c94e78fb55d026a0e9e704d779f5051e539ed8e3aaca88a7d11376d0f818bf87933794befcb41346cee3b005ab5ffd4dd4979bd825ce2bf9b900d55a166f6ce9ebbeb6173e5e9cc404ef3f8d227433387a06958aa4858092283c8d139505805e27fee421f06609c9daaf5b58e36bd9fd3044a867845f1b603ac0d74b") pipe(&(0x7f0000000400)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000140)={0x0, 'veth0_to_team\x00', {0x4}, 0x9}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f00000007c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x138, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0xd0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}]}}]}, 0x138}, 0x1, 0x0, 0x0, 0x2004c013}, 0x1) sendmmsg$sock(r0, &(0x7f0000000100), 0x0, 0x4000) 07:57:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x5421, &(0x7f0000000100)={0x7, 'vlan0\x00'}) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000023d0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000000140)="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", 0xb4a, 0x0, &(0x7f0000001180)={0xa, 0x4e22, 0x0, @dev}, 0x1b) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000c00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000f6ffffff0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0xffffffff}, 0x10) 07:57:28 executing program 3: syz_emit_ethernet(0x246, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaa125adb15f4865a08004e528920202a53"], 0x0) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000023e0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000093c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}], 0x2, 0x0) 07:57:28 executing program 1: syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "952154", 0x1c, 0x3a, 0x0, @private1, @mcast1, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @private2}}}}}}, 0x0) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000d00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000198df6266002c0002"], 0x58}}, 0x0) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000001800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xe5, 0x3, "efe75f8a9b73b0d2e7bc8094c7ef060664a8720f6707ce85cb7c84e0ea4726f045922150f0cb2cd24085c7c66928d13dafd24ca4525cd6cda4663144c512d72189f12cd02495722da7eb80da93423af60971785ab0d1dd884168599ba81c8351b02b7dd4f3dac4f2ca75490ff25361bbdc022cfb438279b2f8db3bb2d30bbcbee5108c4faa646bef007582ba9c0101999a1fc980c136555ea54fd9dad00b457d1b9e31c0e24d0b33e3843c8f179cefa2ba3b4196b6628083a16efe18416951afa82287ffd642c6b1c8c33c306c15fbf97ba3f4ffd49f9c5750ecbe4f62d5746430"}, @ETHTOOL_A_WOL_MODES={0x110, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcb, 0x4, "fe197cd07ba91351f09764dafa9a31dab8b94beb43ee72aa7b5dc409747e28d55e4c5f89ececd73dfc9b8c6c8e4526792f01898df5e16979a9d9e0a45a2a18ea712cda17391ba4f35e98c06a6c1ade12c3786716e9010605b0d8161256cc6f53bbc61b67bd3f80d921698674be556fff630359882d6d990e195aec3ceddd9ef92dd6a4bf1303758b2b147a70d526d087d0cf5735056312791e77e788daffd7899b34e72fa8d186903812f15b1fa5fd698f28ed3e3e927fe71490528e413a4794795e464682a023"}, @ETHTOOL_A_BITSET_VALUE={0x34, 0x4, "dd78340d42226d0eb5a11578e13c1cafae4b881fc7474da5f4661e45c3463714e837e1730aacd1097717cabb43a793b0"}]}, @ETHTOOL_A_WOL_SOPASS={0x81, 0x3, "c9252a8079e7bceeedc702952d144915d6aed199dfc157d08eb74de9a7b416992859d43b3f161d03d6ebb09144a3c912ce951f89fa6acd8bf8a6a7e0fd7a72391f627aa0689ebf7893592952c2f0aa1ee2f569cf56422b13b00da1fa5c56fd488ca27861abfeced6613742c1cc80102f4ee7e1efef52f0433559468af3"}, @ETHTOOL_A_WOL_SOPASS={0xc31, 0x3, "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"}]}, 0xec4}}, 0x10) 07:57:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, &(0x7f0000000140)) 07:57:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x48851, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) 07:57:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000e00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:28 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:28 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000023f0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:28 executing program 1: syz_emit_ethernet(0x3f, &(0x7f00000001c0)={@link_local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '^if', 0x9, 0x11, 0x0, @private0, @local, {[], {0x0, 0x0, 0x9, 0x0, @opaque="9c"}}}}}}, 0x0) 07:57:28 executing program 3: socket(0xa, 0x80003, 0x0) 07:57:29 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000f0ffffff7f000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:29 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000001540)={@link_local, @link_local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010102, @dev}, {0x11, 0x0, 0x0, @local, "2767388e"}}}}}, 0x0) 07:57:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000001000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000), 0x4) 07:57:29 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000440)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 07:57:29 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000880000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000001100000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0xc0189436, &(0x7f0000000100)={0x7, 'vlan0\x00'}) 07:57:29 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000028c0)=""/4096, 0x1000}], 0x1}, 0x0) 07:57:29 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000480000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:29 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000e00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000000ec0)=""/131, 0x26, 0x83, 0x1}, 0x20) 07:57:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000001200000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000e00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000ec0)=""/131, 0x1a, 0x83, 0x1}, 0x20) 07:57:29 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000004c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:29 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000ffffffffffff070000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000e00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000ec0)=""/131, 0x26, 0x83, 0x8}, 0x20) 07:57:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) 07:57:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000001800000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:29 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1705.135338][ T8337] BPF:[1] TYPEDEF (anon) [ 1705.141834][ T8337] BPF:type_id=0 [ 1705.153321][ T8337] BPF: [ 1705.160683][ T8337] BPF:Invalid name [ 1705.173783][ T8337] BPF: [ 1705.173783][ T8337] [ 1705.185690][ T8337] BPF:[1] TYPEDEF (anon) [ 1705.194414][ T8337] BPF:type_id=0 [ 1705.199737][ T8337] BPF: [ 1705.203289][ T8337] BPF:Invalid name [ 1705.207083][ T8337] BPF: [ 1705.207083][ T8337] 07:57:30 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001500)='cpu<0xa||!\x00\x03~\x01\x9c\xd3\x0e5\xa2\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x8d\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\x1dt\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,\xf8\x0e\xbc`M\xfb\xf6\xb8\xc0\xb4b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e-\xb9\xca\xbe\xaaN\x83\xa3\xa5\x96\x00\xf6\xd5\'\xac\xd3\xff\xec\xd2\xfb\xb9\f\x06zS\x03\xdf\xa6;3\x95\x04\x94(\xc9\xa7\fm\xbe\x02\x05\f\x9cxv\xa3\x9a\b.\xe3\xc1\x8f\x96\x8e>\xa6\xcbs+}h\xa5\xa0\xa5\xad\xb6Ws\xcc\x18\xe1\xe6\xbc\n\xad\x15\x7f\xf77n\xa6\x1a\xb2\r\xd5\x9a0\xc3\x7f\xb9m$\x83\n\x83\x958\x8f\xcc\xb4e,\x04\xf8\x1d\x11~0\x01\xcd\x9e\xa5\x81X#\xd0G>\xa7\x1bI\xda9\xe5\xe1\xde\xces\x03\xf6\xae\xdb:\xb9\xe1\xc5\xe1\xbd\xe9\n\xf7|\x04\x92\x9d\r\xa5z\x9e&\xfb^$5\xf5c\x99\n\xb0\x059\xd7l\xb6 \xbd\x9f\xb1\x8a\xa0\xe9\x1a\xb1\xc6\xa2n\xaa\x9dp\xac\xfc\xd7\xf7^o\xfc\x02-#{\xce\xeb\xc6\t\xa5\x94Z\\\xf5n=+!\xf6?\xe2\xde\xb3v\xf9\xde\xca\xdb\xc9\xd3\xdc\x8b\x16\\\x8b<\xcem\'\'\xc4`\x98\xfd\x96\xf5\xc0\x85\xf0\xba') 07:57:30 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000005c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000002500000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xc}]}]}}, &(0x7f0000000180)=""/224, 0x32, 0xe0, 0x1}, 0x20) 07:57:30 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000001019a55c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000003f00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000e00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x6c}]}}, &(0x7f0000000ec0)=""/131, 0x26, 0x83, 0x1}, 0x20) 07:57:30 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000007ffff00000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:30 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)='d', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001480)={&(0x7f00000012c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001400)=[{&(0x7f00000028c0)=""/4096, 0x1000}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x0, 0x1, &(0x7f0000000240)=@raw=[@generic], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:57:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000240)=r2, 0x12) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000008004000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:30 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x1, 0x4, 0x1}, 0x92) 07:57:30 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000007ffffffff00000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000005c00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 07:57:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x0, 0x4}, 0x40) 07:57:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[{0x10, 0x1, 0x2}], 0x10}, 0x0) 07:57:30 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000680000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000a8000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x1}]}]}}, &(0x7f0000000540)=""/4096, 0x2e, 0x1000, 0xffffff17}, 0x20) 07:57:30 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000006a0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00fffffff600000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc}]}]}}, &(0x7f0000000180)=""/224, 0x32, 0xe0, 0x1}, 0x20) 07:57:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="c469256960c3eae82c957b06488fb42cb154fbebe7c2e70aee04b09e53d75ebbc620", 0x22}, {&(0x7f00000002c0)="cdaf047deaaf591a8f8be801664006265601b39e6d2bfc413b7f9a7823fe6dab4338ffb78bb1e0d788a6b67eb4b631362411b7b7852b32f43ea5490895", 0x3d}, {0x0}, {&(0x7f0000000440)="883988cab8cf190a8a5cc37b41314e875f7ca011adcaa514b7a7481c746345c9c73e9b4b135fc5917cd4f8f8a789f43b8676feeb4fdeb7a6cb33575e2087a97b48d41e8ecbc9a5d6e47f55a1b2c78fd8ce76fdc10c6f8b85c0c513046fe4ddd747602e7c64a7f4", 0x67}], 0x4, &(0x7f00000006c0)=[{0xe0, 0x15b, 0x9, "556bd108f09df8c6154889ed5033e65dfab136b5bc44f7d020a9565ae2e460811e977f0b4e041ea5b1593c22c264c69c539f3dd4fd5bde362ad222cc02d02847db4138001ac3a3ba8c469e149348248e8043d0350597880abfaf0dcc4d6dae75df920c06fb4e10f6fb4e5dbf3867448d6c747322adda6f558cdb2a8fb5075bd148a34254392ad661ef006fb50c62fbdf3a23c878a0467f942828be759c0ca006a40f9b3a3b247f4a1aaaf6a44b0bf97b0db0c6e878909a8dfe598c19350373e85a637a95fba193a54aa9c2e52b41cb8c"}, {0x80, 0x11, 0x8001, "62786b479ecb3d1da21e49c07ec7fe2f1a424d5bb7292cde9e90a4a9b7ca7f7e27eb98cf092bb4958bfbb54417379085780dcaade9ce52caebbba2901fe1089284c91810fd9ef43e8cb8f2d533b982b754984202aff6ba22e6713781db1c7a67aeb1ef8aedf4a27ddf6c59"}, {0x10, 0x105, 0x400}, {0x38, 0x107, 0x2, "f0114a1eb40c845b7740c056cf6e81f441260a0c028a191143dff5c5ea3abd24c391c56e"}, {0x18, 0x115, 0x37d, "06f526d6e8"}], 0x1c0}, 0x4080) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8912, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r1}) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@raw=[@ldst={0x3, 0x3, 0x6, 0x3, 0x3, 0x40, 0x1}, @alu={0x4, 0x1, 0x0, 0x6, 0x0, 0x80, 0x1}, @call={0x85, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0x2, 0x1, 0x1, 0x100, 0x1}], &(0x7f0000000080)='GPL\x00', 0xfffffffd, 0x92, &(0x7f0000000180)=""/146, 0x41000, 0x4, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x2, 0x3}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) 07:57:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/224, 0x32, 0xe0, 0x1}, 0x20) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00fffffffe00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000040200000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {}]}]}}, &(0x7f00000001c0)=""/171, 0x36, 0xab, 0x1}, 0x20) 07:57:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="c469256960c3eae82c957b06488fb42cb154fbebe7c2e70aee04b09e53d75ebbc620", 0x22}, {&(0x7f00000002c0)="cdaf047deaaf591a8f8be801664006265601b39e6d2bfc413b7f9a7823fe6dab4338ffb78bb1e0d788a6b67eb4b631362411b7b7852b32f43ea5490895", 0x3d}, {0x0}, {&(0x7f0000000440)="883988cab8cf190a8a5cc37b41314e875f7ca011adcaa514b7a7481c746345c9c73e9b4b135fc5917cd4f8f8a789f43b8676feeb4fdeb7a6cb33575e2087a97b48d41e8ecbc9a5d6e47f55a1b2c78fd8ce76fdc10c6f8b85c0c513046fe4ddd747602e7c64a7f4", 0x67}], 0x4, &(0x7f00000006c0)=[{0xe0, 0x15b, 0x9, "556bd108f09df8c6154889ed5033e65dfab136b5bc44f7d020a9565ae2e460811e977f0b4e041ea5b1593c22c264c69c539f3dd4fd5bde362ad222cc02d02847db4138001ac3a3ba8c469e149348248e8043d0350597880abfaf0dcc4d6dae75df920c06fb4e10f6fb4e5dbf3867448d6c747322adda6f558cdb2a8fb5075bd148a34254392ad661ef006fb50c62fbdf3a23c878a0467f942828be759c0ca006a40f9b3a3b247f4a1aaaf6a44b0bf97b0db0c6e878909a8dfe598c19350373e85a637a95fba193a54aa9c2e52b41cb8c"}, {0x80, 0x11, 0x8001, "62786b479ecb3d1da21e49c07ec7fe2f1a424d5bb7292cde9e90a4a9b7ca7f7e27eb98cf092bb4958bfbb54417379085780dcaade9ce52caebbba2901fe1089284c91810fd9ef43e8cb8f2d533b982b754984202aff6ba22e6713781db1c7a67aeb1ef8aedf4a27ddf6c59"}, {0x10, 0x105, 0x400}, {0x38, 0x107, 0x2, "f0114a1eb40c845b7740c056cf6e81f441260a0c028a191143dff5c5ea3abd24c391c56e"}, {0x18, 0x115, 0x37d, "06f526d6e8"}], 0x1c0}, 0x4080) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8912, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r1}) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@raw=[@ldst={0x3, 0x3, 0x6, 0x3, 0x3, 0x40, 0x1}, @alu={0x4, 0x1, 0x0, 0x6, 0x0, 0x80, 0x1}, @call={0x85, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0x2, 0x1, 0x1, 0x100, 0x1}], &(0x7f0000000080)='GPL\x00', 0xfffffffd, 0x92, &(0x7f0000000180)=""/146, 0x41000, 0x4, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x2, 0x3}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) 07:57:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x4, 0x0, 0x6}]}}, &(0x7f0000000540)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000ff00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x300}, 0x0) sendmsg$tipc(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="263f31184e1615a25c7d361a9fd62aa47221e9ec3e2b54dbd75283985c8c60465bf80a9964b9c3f92a8708fd052bbff764c29d07bac965c2add33dc2558934739c80d6fe6eaf696a60d1971f41ca2e2d4c61412802a3c7ed85adab78d750532ae3c00301427efd2fe2eb58481052e995e0deea4cd32ad13ac1ba804a1a53057de0a7f8c7199fc713", 0x88}], 0x1}, 0x0) 07:57:31 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1707.130141][ T8442] BPF:[1] ENUM (anon) [ 1707.136837][ T8442] BPF: [ 1707.140330][ T8442] BPF:meta_left:12 meta_needed:32 [ 1707.146435][ T8442] BPF: [ 1707.146435][ T8442] [ 1707.154649][ T8442] BPF:[1] ENUM (anon) [ 1707.161557][ T8442] BPF: [ 1707.165046][ T8442] BPF:meta_left:12 meta_needed:32 [ 1707.170244][ T8442] BPF: [ 1707.170244][ T8442] 07:57:31 executing program 1: socket$inet(0x2, 0x2, 0x11) 07:57:31 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)=""/142}, {&(0x7f00000001c0)=""/212}, {&(0x7f0000000000)=""/13}, {&(0x7f00000003c0)=""/65}, {&(0x7f0000000080)=""/44}], 0x10000000000002ee) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00f6ffffff00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000740000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3}, 0xc) 07:57:31 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@rights], 0x10}, 0x0) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00feffffff00000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 2: fchmodat(0xffffffffffffffff, 0x0, 0x0) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000007a0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x13, 0x0, 0x0) 07:57:31 executing program 1: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x2000) 07:57:31 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b00)=[{0x808, 0x0, 0x0, "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"}], 0x808}, 0x0) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000002000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000ffffffffffffff7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 1: r0 = socket(0x18, 0x3, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x4}], 0x1, 0x0) 07:57:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) fcntl$dupfd(r1, 0x0, r1) 07:57:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000003000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003850000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, 0x0, 0x0) 07:57:31 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)=""/142, 0x8e}, {&(0x7f0000000440)=""/212, 0xd4}, {&(0x7f0000000080)=""/4}, {&(0x7f00000001c0)=""/79, 0x4f}, {&(0x7f0000000040)=""/44, 0x2c}], 0x10000253) 07:57:31 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000040600000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x5, 0x0, 0x0) 07:57:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000005000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003880000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000140), 0x8) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000006000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 3: mprotect(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0) mlock(&(0x7f0000e49000/0x1000)=nil, 0x1000) pipe(&(0x7f0000000000)) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000ffffff8c0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000000000000f000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 3: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000026900000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000080), 0x4) 07:57:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) fcntl$getown(r0, 0x5) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000029000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003a60000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xfe11, &(0x7f0000000140), 0x0, 0x0, 0x43}, 0x0) 07:57:32 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x280, 0x0) readv(r0, &(0x7f0000001140)=[{0x0}], 0x1) 07:57:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0xffff, 0x4) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000040000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040), 0x10) 07:57:32 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={&(0x7f00000016c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003a70000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000000001eba44000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x17, 0x0, 0x0) 07:57:32 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@abs={0x0, 0x0, 0x2}, 0x8) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00fffffffffffffffe000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003a80000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003a90000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x6, 0x0, 0x0) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000000007fffffff000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0xa, 0x0, 0x0) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 3: select(0xc6, 0x0, 0x0, 0x0, &(0x7f0000000180)) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000002000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x0, &(0x7f0000000040), 0x10) 07:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendto$unix(r1, 0x0, 0xffffff44, 0x403, 0x0, 0x3c) 07:57:32 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) getrlimit(0x0, &(0x7f0000000000)) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003ab0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000003000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:32 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) 07:57:32 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:32 executing program 3: select(0x90010000, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xc600000000000000}) 07:57:32 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:32 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000004000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:33 executing program 3: write$hidraw(0xffffffffffffffff, 0x0, 0x0) r0 = syz_usb_connect(0x0, 0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000b7dc9b405a082580304e0000000109021fff01000000000904"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) 07:57:33 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000007c0)={{0x12, 0x1, 0x0, 0x17, 0xa, 0xb0, 0x8, 0x14f7, 0x1, 0xeaec, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xa7, 0x12, 0x53}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000dc0)={0x84, &(0x7f0000000880)={0x0, 0x0, 0x1, '{'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f0000000b80)={0x2c, &(0x7f0000000980)={0x40, 0x31, 0xd8, {0xd8, 0x0, "0f0fbec1c621105a620aefc5d0ff84c3de3bc69e2c200aaadbfcd8e7d2cea095576e1dd81f0021ab73d2987db0ca319cf8db4583e467c3f2f0db95a446c4cde45ceacb53ec5b9b545496dc5ce23667a90de1cba1ec4e44ef6dd458ad739e4a89f70d7cdb612ae5c382c8eb4ddadb381d074e83a1f0f713299d8df1e34046a030ba70bcc63d48c22274d3d739ef5cf00700a0e1d968bb26be3fc409322b1304d3830bc566135970a1f9b6cabcbc9e7109474c64b36af0fa3a5feabf7f2d954b91c7235eb7c1091b1684af6f56c358a534e2091169d4be"}}, &(0x7f0000000a80)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1c01}}, &(0x7f0000000ac0)={0x0, 0xf, 0x23, {0x5, 0xf, 0x23, 0x3, [@ext_cap={0x7, 0x10, 0x2, 0x10, 0x7, 0x7, 0xfff}, @ss_container_id={0x14, 0x10, 0x4, 0x3, "e29e0a9fb2bb6c83e1ffdbcf58158553"}, @ptm_cap={0x3}]}}, &(0x7f0000000b00)={0x20, 0x29, 0xf, {0xf, 0x29, 0x18, 0x4, 0xd, 0x7, "a7d8bb31", "7cba120d"}}, &(0x7f0000000b40)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x8, 0x18, 0x9, 0x2b, 0x5, 0x6, 0x401}}}, &(0x7f0000001180)={0x84, &(0x7f0000000bc0)={0x40, 0xa, 0xfc, "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"}, &(0x7f0000000d00)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000000d40)={0x0, 0x8, 0x1, 0xff}, &(0x7f0000000d80)={0x20, 0x0, 0x4, {0x1, 0x2}}, &(0x7f0000000e80)={0x20, 0x0, 0x4, {0x8, 0xe0}}, &(0x7f0000000ec0)={0x40, 0x7, 0x2, 0xfbff}, &(0x7f0000000f00)={0x40, 0x9, 0x1, 0x3}, &(0x7f0000000f40)={0x40, 0xb, 0x2, "f46e"}, &(0x7f0000000f80)={0x40, 0xf, 0x2, 0xff}, &(0x7f0000000fc0)={0x40, 0x13, 0x6, @local}, &(0x7f0000001000)={0x40, 0x17, 0x6}, &(0x7f0000001040)={0x40, 0x19, 0x2, "15b0"}, &(0x7f0000001080)={0x40, 0x1a, 0x2, 0x2}, &(0x7f00000010c0)={0x40, 0x1c, 0x1, 0xbc}, &(0x7f0000001100)={0x40, 0x1e, 0x1, 0x7f}, &(0x7f0000001140)={0x40, 0x21, 0x1, 0x1f}}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f00000008c0)=""/151, 0x97) syz_usb_connect$cdc_ncm(0x2, 0x79, &(0x7f0000002000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0xff, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x2, 0x1, 0x9, 0xa0, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x1, "f92edb"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x5, 0xfffe, 0x9}, {0x6, 0x24, 0x1a, 0xfa0, 0x20}, [@mbim_extended={0x8, 0x24, 0x1c, 0x9, 0x9, 0x7}]}, {{0x9, 0x5, 0x81, 0x3, 0x400, 0x2, 0x81, 0x2}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x82, 0x7, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x13, 0x9, 0x3f}}}}}}}]}}, &(0x7f0000002140)={0xa, &(0x7f0000002080)={0xa, 0x6, 0x250, 0xff, 0x0, 0x6, 0x0, 0x7}, 0x1c, &(0x7f00000020c0)={0x5, 0xf, 0x1c, 0x2, [@ssp_cap={0x14, 0x10, 0xa, 0x4, 0x2, 0x4, 0xf000, 0x7, [0xf, 0xc00f]}, @ptm_cap={0x3}]}, 0x1, [{0x4, &(0x7f0000002100)=@lang_id={0x4, 0x3, 0x1401}}]}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 07:57:33 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:33 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003ad0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000005000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:33 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:33 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003ae0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000006000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:33 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1709.011224][T13574] usb 3-1: new high-speed USB device number 59 using dummy_hcd [ 1709.061212][ T9404] usb 2-1: new high-speed USB device number 58 using dummy_hcd [ 1709.101200][T13595] usb 4-1: new high-speed USB device number 100 using dummy_hcd [ 1709.323053][ T9404] usb 2-1: Using ep0 maxpacket: 8 [ 1709.411490][T13574] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1709.420624][T13574] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1709.433207][T13574] usb 3-1: config 0 descriptor?? [ 1709.461569][ T9404] usb 2-1: New USB device found, idVendor=14f7, idProduct=0001, bcdDevice=ea.ec [ 1709.462611][T13595] usb 4-1: config index 0 descriptor too short (expected 65311, got 60) [ 1709.471962][ T9404] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1709.480273][T13595] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1709.497834][ T9404] usb 2-1: config 0 descriptor?? [ 1709.520182][T13595] usb 4-1: New USB device found, idVendor=085a, idProduct=8025, bcdDevice=4e.30 [ 1709.541940][T13595] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1709.559499][T13595] usb 4-1: config 0 descriptor?? [ 1709.602196][T13595] keyspan_pda 4-1:0.0: Keyspan PDA - (prerenumeration) converter detected [ 1709.761221][ T9404] dvb-usb: found a 'Technisat SkyStar USB 2 HD CI' in warm state. [ 1709.775758][ T9404] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 1709.803409][ T9404] dvbdev: DVB: registering new adapter (Technisat SkyStar USB 2 HD CI) [ 1709.813057][ T9404] usb 2-1: media controller created [ 1709.821821][ T9404] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 1709.941243][T13574] ath6kl: Failed to read usb control message: -110 [ 1709.948007][T13574] ath6kl: Unable to read the bmi data from the device: -110 [ 1709.956886][T13574] ath6kl: Unable to recv target info: -110 [ 1710.131498][T13574] ath6kl: Failed to init ath6kl core: -110 [ 1710.137459][T13574] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1710.148085][T13574] usb 3-1: USB disconnect, device number 59 [ 1710.164871][ T8655] udc-core: couldn't find an available UDC or it's busy [ 1710.171916][ T8655] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 1710.186878][ T9404] az6027: usb out operation failed. (-71) [ 1710.194749][ T9404] stb0899_attach: Driver disabled by Kconfig [ 1710.200858][ T9404] az6027: no front-end attached [ 1710.200858][ T9404] [ 1710.221668][ T9404] az6027: usb out operation failed. (-71) [ 1710.228009][ T9404] dvb-usb: no frontend was attached by 'Technisat SkyStar USB 2 HD CI' [ 1710.240264][ T9404] input: IR-receiver inside an USB DVB receiver as /devices/platform/dummy_hcd.1/usb2/2-1/input/input185 [ 1710.257642][ T9404] dvb-usb: schedule remote query interval to 400 msecs. [ 1710.261171][T13595] usb 4-1: ezusb_set_reset-1 failed: -71 [ 1710.265074][ T9404] dvb-usb: Technisat SkyStar USB 2 HD CI successfully initialized and connected. [ 1710.275193][T13595] usb 4-1: failed to load firmware "keyspan_pda/xircom_pgs.fw" [ 1710.282538][ T9404] usb 2-1: USB disconnect, device number 58 [ 1710.312607][ T9404] dvb-usb: Technisat SkyStar USB 2 HD CI successfully deinitialized and disconnected. [ 1710.320642][T13595] keyspan_pda: probe of 4-1:0.0 failed with error -2 [ 1710.338109][T13595] usb 4-1: USB disconnect, device number 100 [ 1710.891186][T13595] usb 3-1: new high-speed USB device number 60 using dummy_hcd [ 1710.961183][ T8956] usb 2-1: new high-speed USB device number 59 using dummy_hcd [ 1711.201193][ T8956] usb 2-1: Using ep0 maxpacket: 8 [ 1711.251228][T13595] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1711.260401][T13595] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1711.273909][T13595] usb 3-1: config 0 descriptor?? [ 1711.321198][ T8956] usb 2-1: New USB device found, idVendor=14f7, idProduct=0001, bcdDevice=ea.ec [ 1711.330437][ T8956] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1711.339418][ T8956] usb 2-1: config 0 descriptor?? 07:57:35 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:35 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003af0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000007000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:35 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1711.534869][T13595] ath6kl: Failed to submit usb control message: -71 [ 1711.545114][T13595] ath6kl: unable to send the bmi data to the device: -71 [ 1711.565907][T13595] ath6kl: Unable to send get target info: -71 [ 1711.586258][T13595] ath6kl: Failed to init ath6kl core: -71 [ 1711.601240][ T8956] dvb-usb: found a 'Technisat SkyStar USB 2 HD CI' in warm state. [ 1711.617848][ T8956] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 1711.633050][T13595] ath6kl_usb: probe of 3-1:0.0 failed with error -71 [ 1711.649716][T13595] usb 3-1: USB disconnect, device number 60 [ 1711.660104][ T8956] dvbdev: DVB: registering new adapter (Technisat SkyStar USB 2 HD CI) [ 1711.669293][ T8956] usb 2-1: media controller created [ 1711.688027][ T8956] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. 07:57:36 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x6, 0x0) 07:57:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) flock(r0, 0x3) 07:57:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000008000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:36 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003b00000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:36 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1711.784355][ T8956] az6027: usb out operation failed. (-71) [ 1711.792863][ T8956] stb0899_attach: Driver disabled by Kconfig [ 1711.822369][ T8956] az6027: no front-end attached [ 1711.822369][ T8956] 07:57:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000009000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:36 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000003f00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:36 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003b10000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1711.851232][ T8956] az6027: usb out operation failed. (-71) [ 1711.861481][ T8956] dvb-usb: no frontend was attached by 'Technisat SkyStar USB 2 HD CI' [ 1711.880112][ T8956] input: IR-receiver inside an USB DVB receiver as /devices/platform/dummy_hcd.1/usb2/2-1/input/input186 [ 1711.923144][ T8956] dvb-usb: schedule remote query interval to 400 msecs. [ 1711.940244][ T8956] dvb-usb: Technisat SkyStar USB 2 HD CI successfully initialized and connected. [ 1711.980932][ T8956] usb 2-1: USB disconnect, device number 59 [ 1712.009356][ T8956] dvb-usb: Technisat SkyStar USB 2 HD CI successfully deinitialized and disconnected. [ 1712.041172][T13595] usb 3-1: new high-speed USB device number 61 using dummy_hcd [ 1712.401232][T13595] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1712.410514][T13595] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1712.419469][T13595] usb 3-1: config 0 descriptor?? [ 1712.901286][T13595] ath6kl: Failed to read usb control message: -110 [ 1712.908829][T13595] ath6kl: Unable to read the bmi data from the device: -110 [ 1712.917133][T13595] ath6kl: Unable to recv target info: -110 [ 1713.101387][T13595] ath6kl: Failed to init ath6kl core: -110 [ 1713.107459][T13595] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1713.117630][T13595] usb 3-1: USB disconnect, device number 61 07:57:37 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:37 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0xb, 0x0, 0x0) 07:57:37 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003b20000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:37 executing program 1: syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x0) write$hidraw(0xffffffffffffffff, 0x0, 0x0) write$hidraw(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_usb_connect(0x0, 0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000b7dc9b405a082580304e0000000109021fff01000000000904"], 0x0) 07:57:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000a000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:37 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000008004000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000b000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:37 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000005c00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:38 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003b30000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, "4330ef1d8fc0daff7170c65ac023b592890703ff3f90bc7ca94a2d9a6cecdc15"}) 07:57:38 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000ffffffffffffff7f00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:38 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1713.941206][T13595] usb 2-1: new high-speed USB device number 60 using dummy_hcd [ 1714.021171][ T8792] usb 3-1: new high-speed USB device number 62 using dummy_hcd [ 1714.311470][T13595] usb 2-1: config index 0 descriptor too short (expected 65311, got 60) [ 1714.323176][T13595] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1714.346947][T13595] usb 2-1: New USB device found, idVendor=085a, idProduct=8025, bcdDevice=4e.30 [ 1714.368757][T13595] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1714.388325][T13595] usb 2-1: config 0 descriptor?? [ 1714.396770][ T8792] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1714.409906][ T8792] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1714.422252][ T8792] usb 3-1: config 0 descriptor?? [ 1714.462345][T13595] keyspan_pda 2-1:0.0: Keyspan PDA - (prerenumeration) converter detected [ 1714.681306][T13595] usb 2-1: ezusb_set_reset-1 failed: -71 [ 1714.701229][T13595] usb 2-1: ezusb_set_reset-0 failed: -71 [ 1714.707215][T13595] usb 2-1: failed to load firmware "keyspan_pda/xircom_pgs.fw" [ 1714.715316][T13595] keyspan_pda: probe of 2-1:0.0 failed with error -2 [ 1714.725586][T13595] usb 2-1: USB disconnect, device number 60 [ 1714.901235][ T8792] ath6kl: Failed to read usb control message: -110 [ 1714.907924][ T8792] ath6kl: Unable to read the bmi data from the device: -110 [ 1714.915678][ T8792] ath6kl: Unable to recv target info: -110 [ 1715.101376][ T8792] ath6kl: Failed to init ath6kl core: -110 [ 1715.107360][ T8792] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1715.117366][ T8792] usb 3-1: USB disconnect, device number 62 07:57:39 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0xcc, 0x6c, 0x4d, 0x10, 0x1199, 0x6853, 0x4a88, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xae, 0xe7, 0x87}}]}}]}}, 0x0) 07:57:39 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:39 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:39 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000001c10000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:39 executing program 1: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000369ddd10341902120887000000010902240001000000000904750002ab21c10009050d1e00f200000009058d020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000e40)={0x2c, &(0x7f0000000bc0)={0x0, 0x0, 0x1, 'b'}, 0x0, 0x0, 0x0, 0x0}) 07:57:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000c000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:39 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000001c20000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:39 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000000000000001bc000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000d000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:40 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003d10000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:40 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffffffffffffdef00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000e000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1715.911193][ T9106] usb 2-1: new high-speed USB device number 61 using dummy_hcd [ 1715.931204][ T3959] usb 4-1: new high-speed USB device number 101 using dummy_hcd [ 1715.961299][ T8792] usb 3-1: new high-speed USB device number 63 using dummy_hcd [ 1716.151179][ T9106] usb 2-1: Using ep0 maxpacket: 16 [ 1716.191570][ T3959] usb 4-1: Using ep0 maxpacket: 16 [ 1716.271486][ T9106] usb 2-1: config 0 has an invalid interface number: 117 but max is 0 [ 1716.279937][ T9106] usb 2-1: config 0 has no interface number 0 [ 1716.286914][ T9106] usb 2-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 1716.297649][ T9106] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1716.306860][ T9106] usb 2-1: config 0 descriptor?? [ 1716.321558][ T8792] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1716.333033][ T8792] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1716.342503][ T8792] usb 3-1: config 0 descriptor?? [ 1716.511234][ T3959] usb 4-1: New USB device found, idVendor=1199, idProduct=6853, bcdDevice=4a.88 [ 1716.520318][ T3959] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1716.529265][ T3959] usb 4-1: Product: syz [ 1716.533703][ T3959] usb 4-1: Manufacturer: syz [ 1716.538322][ T3959] usb 4-1: SerialNumber: syz [ 1716.547536][ T3959] usb 4-1: config 0 descriptor?? [ 1716.614418][ T3959] sierra 4-1:0.0: Sierra USB modem converter detected [ 1716.821286][ T8792] ath6kl: Failed to read usb control message: -110 [ 1716.827966][ T8792] ath6kl: Unable to read the bmi data from the device: -110 [ 1716.837073][ T8792] ath6kl: Unable to recv target info: -110 [ 1716.844680][ T3959] usb 4-1: Sierra USB modem converter now attached to ttyUSB0 [ 1716.853446][ T3959] usb 4-1: USB disconnect, device number 101 [ 1716.866669][ T3959] sierra ttyUSB0: Sierra USB modem converter now disconnected from ttyUSB0 [ 1716.876746][ T3959] sierra 4-1:0.0: device disconnected [ 1717.021478][ T8792] ath6kl: Failed to init ath6kl core: -110 [ 1717.027485][ T8792] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1717.038792][ T8792] usb 3-1: USB disconnect, device number 63 [ 1717.191216][ T9106] f81534 2-1:0.117: f81534_get_register: reg: 1003 failed: -71 [ 1717.198996][ T9106] f81534 2-1:0.117: f81534_find_config_idx: read failed: -71 [ 1717.206500][ T9106] f81534 2-1:0.117: f81534_calc_num_ports: find idx failed: -71 [ 1717.214465][ T9106] f81534: probe of 2-1:0.117 failed with error -71 [ 1717.223232][ T9106] usb 2-1: USB disconnect, device number 61 [ 1717.581216][ T8792] usb 4-1: new high-speed USB device number 102 using dummy_hcd [ 1717.761216][T13595] usb 2-1: new high-speed USB device number 62 using dummy_hcd [ 1717.821225][ T8792] usb 4-1: Using ep0 maxpacket: 16 [ 1718.001235][T13595] usb 2-1: Using ep0 maxpacket: 16 [ 1718.101790][ T8792] usb 4-1: New USB device found, idVendor=1199, idProduct=6853, bcdDevice=4a.88 [ 1718.110843][ T8792] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1718.119555][ T8792] usb 4-1: Product: syz [ 1718.124107][T13595] usb 2-1: config 0 has an invalid interface number: 117 but max is 0 [ 1718.132700][ T8792] usb 4-1: Manufacturer: syz [ 1718.137345][ T8792] usb 4-1: SerialNumber: syz [ 1718.142036][T13595] usb 2-1: config 0 has no interface number 0 [ 1718.148184][T13595] usb 2-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 1718.162713][ T8792] usb 4-1: config 0 descriptor?? [ 1718.167851][T13595] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1718.180448][T13595] usb 2-1: config 0 descriptor?? [ 1718.204701][ T8792] sierra 4-1:0.0: Sierra USB modem converter detected 07:57:42 executing program 3: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:57:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000003d20000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000010000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000fffffff600000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1718.421261][ T8792] usb 4-1: Sierra USB modem converter now attached to ttyUSB0 [ 1718.445797][ T8792] usb 4-1: USB disconnect, device number 102 [ 1718.464640][ T8792] sierra ttyUSB0: Sierra USB modem converter now disconnected from ttyUSB0 [ 1718.497836][ T8792] sierra 4-1:0.0: device disconnected 07:57:42 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000000000e40260933334100001b00010902240001000000000904000001030100000921100000012201000905810308"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000840)={0x2c, &(0x7f0000000580)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_ep_write(r0, 0x0, 0x0, 0x0) 07:57:42 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) 07:57:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000026db0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000011000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000fffffffe00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:42 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000026e80000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:42 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000fffffffffffffffe00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000012000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1718.821234][T13595] f81534 2-1:0.117: f81534_get_register: reg: 1003 failed: -71 [ 1718.829046][T13595] f81534 2-1:0.117: f81534_find_config_idx: read failed: -71 [ 1718.845882][T13595] f81534 2-1:0.117: f81534_calc_num_ports: find idx failed: -71 [ 1718.857029][T13595] f81534: probe of 2-1:0.117 failed with error -71 [ 1718.864337][ T8792] usb 4-1: new high-speed USB device number 103 using dummy_hcd [ 1718.875121][T13595] usb 2-1: USB disconnect, device number 62 [ 1718.941188][ T9106] usb 3-1: new high-speed USB device number 64 using dummy_hcd [ 1719.121207][ T8792] usb 4-1: Using ep0 maxpacket: 8 [ 1719.231210][T13595] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 1719.242314][ T8792] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1719.253548][ T8792] usb 4-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1719.263625][ T8792] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1719.276234][ T8792] usb 4-1: config 0 descriptor?? [ 1719.302425][ T9106] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1719.311544][ T9106] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1719.320469][ T9106] usb 3-1: config 0 descriptor?? [ 1719.552219][ T8792] iowarrior 4-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1719.592769][T13595] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1719.681281][T13595] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.41 [ 1719.681310][T13595] usb 2-1: New USB device strings: Mfr=0, Product=27, SerialNumber=0 [ 1719.681329][T13595] usb 2-1: Product: syz [ 1719.682290][T13595] usb 2-1: config 0 descriptor?? [ 1719.811354][ T9106] ath6kl: Failed to read usb control message: -110 [ 1719.818070][ T9106] ath6kl: Unable to read the bmi data from the device: -110 [ 1719.825935][ T9106] ath6kl: Unable to recv target info: -110 [ 1719.832464][ T9106] ath6kl: Failed to init ath6kl core: -110 [ 1719.838568][ T9106] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1719.848359][ T9106] usb 3-1: USB disconnect, device number 64 [ 1720.201675][T13595] keytouch 0003:0926:3333.0044: fixing up Keytouch IEC report descriptor [ 1720.216620][T13595] input: syz as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.0044/input/input187 [ 1720.294303][T13595] keytouch 0003:0926:3333.0044: input,hidraw0: USB HID v0.10 Keyboard [syz] on usb-dummy_hcd.1-1/input0 [ 1720.606233][T25556] usb 2-1: USB disconnect, device number 63 [ 1720.662347][T13595] usb 4-1: USB disconnect, device number 103 [ 1720.675817][T13595] iowarrior 4-1:0.0: I/O-Warror #0 now disconnected [ 1721.371204][ T3959] usb 2-1: new high-speed USB device number 64 using dummy_hcd [ 1721.441229][T25556] usb 4-1: new high-speed USB device number 104 using dummy_hcd [ 1721.681227][T25556] usb 4-1: Using ep0 maxpacket: 8 [ 1721.751242][ T3959] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1721.801863][T25556] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1721.812919][T25556] usb 4-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1721.822764][T25556] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1721.832985][T25556] usb 4-1: config 0 descriptor?? [ 1721.842030][ T3959] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.41 [ 1721.851076][ T3959] usb 2-1: New USB device strings: Mfr=0, Product=27, SerialNumber=0 [ 1721.861439][ T3959] usb 2-1: Product: syz [ 1721.870142][ T3959] usb 2-1: config 0 descriptor?? 07:57:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000026e90000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:46 executing program 3: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:57:46 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x66, 0xfe, 0x51, 0x40, 0x694, 0x1, 0xac1f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xc1, 0x43, 0x44}}]}}]}}, 0x0) 07:57:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000018000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:46 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) [ 1721.931302][ T3959] usb 2-1: can't set config #0, error -71 [ 1721.937485][ T3959] usb 2-1: USB disconnect, device number 64 [ 1722.003186][T25556] iowarrior 4-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 07:57:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000025000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1722.043942][T25556] usb 4-1: USB disconnect, device number 104 [ 1722.066787][T25556] iowarrior 4-1:0.0: I/O-Warror #0 now disconnected 07:57:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffff60000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00005c000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:46 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000000007ffffffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:46 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffdf90000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000fe000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1722.341225][T13574] usb 3-1: new high-speed USB device number 65 using dummy_hcd [ 1722.431233][ T3959] usb 2-1: new high-speed USB device number 65 using dummy_hcd [ 1722.501214][T25556] usb 4-1: new high-speed USB device number 105 using dummy_hcd [ 1722.721582][T13574] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1722.731614][T13574] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1722.741301][T25556] usb 4-1: Using ep0 maxpacket: 8 [ 1722.750824][T13574] usb 3-1: config 0 descriptor?? [ 1722.843253][ T3959] usb 2-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=ac.1f [ 1722.852508][ T3959] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1722.864435][T25556] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1722.868077][ T3959] usb 2-1: config 0 descriptor?? [ 1722.883746][T25556] usb 4-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1722.894903][T25556] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1722.910133][T25556] usb 4-1: config 0 descriptor?? [ 1722.922933][ T3959] legousbtower 2-1:0.0: interrupt endpoints not found [ 1723.123813][T13595] usb 2-1: USB disconnect, device number 65 [ 1723.174722][T25556] iowarrior 4-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1723.221387][T13574] ath6kl: Failed to read usb control message: -71 [ 1723.229493][T13574] ath6kl: Unable to read the bmi data from the device: -71 [ 1723.237361][T13574] ath6kl: Unable to recv target info: -71 [ 1723.243631][T13574] ath6kl: Failed to init ath6kl core: -71 [ 1723.250030][T13574] ath6kl_usb: probe of 3-1:0.0 failed with error -71 [ 1723.259724][T13574] usb 3-1: USB disconnect, device number 65 [ 1723.801515][ T3237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1723.807936][ T3237] ieee802154 phy1 wpan1: encryption failed: -22 [ 1723.901248][T25556] usb 2-1: new high-speed USB device number 66 using dummy_hcd [ 1724.261598][T25556] usb 2-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=ac.1f [ 1724.262778][ T3959] usb 4-1: USB disconnect, device number 105 [ 1724.270658][T25556] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1724.290262][ T3959] iowarrior 4-1:0.0: I/O-Warror #0 now disconnected [ 1724.321504][T25556] usb 2-1: config 0 descriptor?? [ 1724.382786][T25556] legousbtower 2-1:0.0: interrupt endpoints not found [ 1724.585173][T25556] usb 2-1: USB disconnect, device number 66 07:57:49 executing program 3: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:57:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000effdffffffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffffb0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000004020000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:49 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) 07:57:49 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:57:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000030000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffdfd0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000000000000000000000000000000000000000007fffffffffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000002040000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:49 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffffe0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:49 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000feffffffffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1725.111206][T13595] usb 2-1: new high-speed USB device number 67 using dummy_hcd [ 1725.151202][ T9404] usb 3-1: new high-speed USB device number 66 using dummy_hcd [ 1725.161631][ T3959] usb 4-1: new high-speed USB device number 106 using dummy_hcd [ 1725.351239][T13595] usb 2-1: Using ep0 maxpacket: 8 [ 1725.411331][ T3959] usb 4-1: Using ep0 maxpacket: 8 [ 1725.471745][T13595] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1725.483122][T13595] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1725.492739][T13595] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1725.502164][T13595] usb 2-1: config 0 descriptor?? [ 1725.561690][ T9404] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1725.570805][ T9404] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1725.579523][ T3959] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1725.590541][ T3959] usb 4-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1725.600675][ T3959] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1725.609421][ T9404] usb 3-1: config 0 descriptor?? [ 1725.617367][ T3959] usb 4-1: config 0 descriptor?? [ 1725.761647][T13595] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1725.891533][ T3959] iowarrior 4-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior1 [ 1726.101443][ T9404] ath6kl: Failed to read usb control message: -110 [ 1726.109068][ T9404] ath6kl: Unable to read the bmi data from the device: -110 [ 1726.116937][ T9404] ath6kl: Unable to recv target info: -110 [ 1726.123294][ T9404] ath6kl: Failed to init ath6kl core: -110 [ 1726.130026][ T9404] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1726.140283][ T9404] usb 3-1: USB disconnect, device number 66 [ 1726.851931][T13595] usb 2-1: USB disconnect, device number 67 [ 1726.874161][T13595] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:57:52 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) write$char_usb(r0, 0x0, 0x0) 07:57:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000006040000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000ffffffffffffffff00000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:52 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:52 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) [ 1727.854726][ T9404] usb 4-1: USB disconnect, device number 106 [ 1727.862805][ T9404] iowarrior 4-1:0.0: I/O-Warror #1 now disconnected 07:57:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000fff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000050000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:52 executing program 3: syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000800)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$char_usb(r0, &(0x7f00000008c0)="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", 0xd90) 07:57:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000fffffdff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000060000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:52 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000004060000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:52 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000000007fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1728.211223][T13595] usb 3-1: new high-speed USB device number 67 using dummy_hcd [ 1728.231202][ T3959] usb 2-1: new high-speed USB device number 68 using dummy_hcd [ 1728.481259][ T3959] usb 2-1: Using ep0 maxpacket: 8 [ 1728.571854][T13595] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1728.581540][T13595] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1728.590756][T13595] usb 3-1: config 0 descriptor?? [ 1728.621577][ T3959] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1728.632903][ T3959] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1728.642948][ T3959] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1728.652780][ T3959] usb 2-1: config 0 descriptor?? [ 1728.901995][ T3959] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1729.061248][T13595] ath6kl: Failed to read usb control message: -110 [ 1729.067792][T13595] ath6kl: Unable to read the bmi data from the device: -110 [ 1729.076896][T13595] ath6kl: Unable to recv target info: -110 [ 1729.261344][T13595] ath6kl: Failed to init ath6kl core: -110 [ 1729.267637][T13595] ath6kl_usb: probe of 3-1:0.0 failed with error -110 [ 1729.277539][T13595] usb 3-1: USB disconnect, device number 67 07:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000070000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1729.992027][ T8792] usb 2-1: USB disconnect, device number 68 [ 1730.011975][ T8792] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:57:54 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:57:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:54 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:54 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f6bed808720c0d00c91b000000010902120001000000000904"], 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000700)={0x84, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r1, 0x0, &(0x7f0000000bc0)={0x84, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, 0x0) 07:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000090000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000007ffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000a0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:54 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000007fffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:54 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000800a0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1730.831198][ T3959] usb 3-1: new high-speed USB device number 68 using dummy_hcd [ 1730.841982][T13595] usb 4-1: new high-speed USB device number 107 using dummy_hcd [ 1730.871212][ T8792] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 1731.081249][T13595] usb 4-1: Using ep0 maxpacket: 8 [ 1731.111215][ T8792] usb 2-1: Using ep0 maxpacket: 8 [ 1731.201246][ T3959] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1731.201563][T13595] usb 4-1: New USB device found, idVendor=0c72, idProduct=000d, bcdDevice=1b.c9 [ 1731.212604][ T3959] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1731.220916][T13595] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1731.232005][ T3959] usb 3-1: config 0 descriptor?? [ 1731.240332][ T8792] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1731.252368][ T8792] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1731.263337][ T8792] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1731.271864][T13595] usb 4-1: config 0 descriptor?? [ 1731.283535][ T8792] usb 2-1: config 0 descriptor?? [ 1731.531223][T13595] peak_usb 4-1:0.0 can0: unable to request usb[type=0 value=1] err=-71 [ 1731.539705][T13595] peak_usb 4-1:0.0: unable to read PCAN-USB Pro firmware info (err -71) [ 1731.552229][ T8792] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1731.611303][T13595] peak_usb: probe of 4-1:0.0 failed with error -71 [ 1731.620418][T13595] usb 4-1: USB disconnect, device number 107 [ 1731.691373][ T3959] ath6kl: Failed to submit usb control message: -71 [ 1731.698213][ T3959] ath6kl: unable to send the bmi data to the device: -71 [ 1731.727769][ T3959] ath6kl: Unable to send get target info: -71 [ 1731.736107][ T3959] ath6kl: Failed to init ath6kl core: -71 [ 1731.742500][ T3959] ath6kl_usb: probe of 3-1:0.0 failed with error -71 [ 1731.754938][ T3959] usb 3-1: USB disconnect, device number 68 [ 1732.081225][T13595] usb 4-1: new high-speed USB device number 108 using dummy_hcd [ 1732.321220][T13595] usb 4-1: Using ep0 maxpacket: 8 [ 1732.441258][T13595] usb 4-1: New USB device found, idVendor=0c72, idProduct=000d, bcdDevice=1b.c9 [ 1732.450816][T13595] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1732.460379][T13595] usb 4-1: config 0 descriptor?? [ 1732.675272][T25556] usb 2-1: USB disconnect, device number 69 [ 1732.699837][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected [ 1733.141220][T13595] peak_usb 4-1:0.0: PEAK-System PCAN-USB Pro hwrev 0 serial 00000000.00000000 (2 channels) [ 1733.152526][T13595] peak_usb 4-1:0.0 can0: sending command failure: -22 [ 1733.159342][T13595] peak_usb 4-1:0.0 can0: sending command failure: -22 07:57:57 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) read$char_usb(0xffffffffffffffff, &(0x7f0000000000)=""/73, 0x49) 07:57:57 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:57:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000b0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1733.201279][T13595] peak_usb: probe of 4-1:0.0 failed with error -22 [ 1733.343584][T13595] usb 4-1: USB disconnect, device number 108 [ 1733.571247][T13574] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 1733.811198][T13574] usb 2-1: Using ep0 maxpacket: 8 [ 1733.942207][T13574] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1733.953809][T13574] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1733.962920][T13574] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1733.974578][T13574] usb 2-1: config 0 descriptor?? [ 1734.111294][T25556] usb 4-1: new high-speed USB device number 109 using dummy_hcd [ 1734.221627][T13574] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1734.351231][T25556] usb 4-1: Using ep0 maxpacket: 8 [ 1734.471670][T25556] usb 4-1: New USB device found, idVendor=0c72, idProduct=000d, bcdDevice=1b.c9 [ 1734.480811][T25556] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1734.493477][T25556] usb 4-1: config 0 descriptor?? 07:57:58 executing program 3: r0 = syz_usb_connect$printer(0x0, 0x0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000800)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$char_usb(r1, &(0x7f00000008c0)="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", 0x400) 07:57:58 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:58 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:57:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000c0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:58 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1734.671220][T25556] peak_usb 4-1:0.0 can0: unable to request usb[type=0 value=1] err=-71 [ 1734.688112][T25556] peak_usb 4-1:0.0: unable to read PCAN-USB Pro firmware info (err -71) 07:57:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000d0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:57:59 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:57:59 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1734.753307][T25556] peak_usb: probe of 4-1:0.0 failed with error -71 [ 1734.776436][T25556] usb 4-1: USB disconnect, device number 109 [ 1734.991229][ T9106] usb 3-1: new high-speed USB device number 69 using dummy_hcd [ 1735.351287][ T9106] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1735.360382][ T9106] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1735.373084][ T9106] usb 3-1: config 0 descriptor?? [ 1735.831354][ T9106] ath6kl: Failed to submit usb control message: -71 [ 1735.837994][ T9106] ath6kl: unable to send the bmi data to the device: -71 [ 1735.845158][ T9106] ath6kl: Unable to send get target info: -71 [ 1735.851502][ T9106] ath6kl: Failed to init ath6kl core: -71 [ 1735.857355][ T9106] ath6kl_usb: probe of 3-1:0.0 failed with error -71 [ 1735.866427][ T9106] usb 3-1: USB disconnect, device number 69 07:58:00 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) read$char_usb(0xffffffffffffffff, &(0x7f0000000000)=""/73, 0x49) 07:58:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000e0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:00 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x46d, 0xc081, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) [ 1736.249126][T13574] usb 2-1: USB disconnect, device number 70 [ 1736.258560][T13574] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:00 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 07:58:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000110000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:00 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:00 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000120000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1736.581241][ T9106] usb 4-1: new high-speed USB device number 110 using dummy_hcd [ 1736.691222][ T3959] usb 3-1: new high-speed USB device number 70 using dummy_hcd [ 1736.721245][T13574] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 1736.941252][ T9106] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1736.981297][T13574] usb 2-1: Using ep0 maxpacket: 8 [ 1737.101291][ T3959] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 1737.110358][ T3959] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1737.111647][ T9106] usb 4-1: New USB device found, idVendor=046d, idProduct=c081, bcdDevice= 0.40 [ 1737.127567][ T9106] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1737.132572][T13574] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1737.146727][ T9106] usb 4-1: Product: syz [ 1737.148708][ T3959] usb 3-1: config 0 descriptor?? [ 1737.150976][ T9106] usb 4-1: Manufacturer: syz [ 1737.156037][T13574] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1737.169656][ T9106] usb 4-1: SerialNumber: syz [ 1737.172179][T13574] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1737.188167][T13574] usb 2-1: config 0 descriptor?? [ 1737.223911][ T9106] usbhid 4-1:1.0: couldn't find an input interrupt endpoint [ 1737.424071][ T9106] usb 4-1: USB disconnect, device number 110 [ 1737.464349][T13574] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1737.611385][ T3959] ath6kl: Failed to submit usb control message: -71 [ 1737.618107][ T3959] ath6kl: unable to send the bmi data to the device: -71 [ 1737.625668][ T3959] ath6kl: Unable to send get target info: -71 [ 1737.632221][ T3959] ath6kl: Failed to init ath6kl core: -71 [ 1737.638169][ T3959] ath6kl_usb: probe of 3-1:0.0 failed with error -71 [ 1737.647776][ T3959] usb 3-1: USB disconnect, device number 70 [ 1738.211645][ T3959] usb 4-1: new high-speed USB device number 111 using dummy_hcd [ 1738.601676][ T3959] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1738.771630][ T3959] usb 4-1: New USB device found, idVendor=046d, idProduct=c081, bcdDevice= 0.40 [ 1738.780753][ T3959] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1738.789343][ T3959] usb 4-1: Product: syz [ 1738.793598][ T3959] usb 4-1: Manufacturer: syz [ 1738.798210][ T3959] usb 4-1: SerialNumber: syz [ 1738.856576][ T3959] usbhid 4-1:1.0: couldn't find an input interrupt endpoint [ 1739.055405][T25556] usb 4-1: USB disconnect, device number 111 07:58:03 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) read$char_usb(0xffffffffffffffff, &(0x7f0000000000)=""/73, 0x49) 07:58:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000180000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:03 executing program 2: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) 07:58:03 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000001740)=[{&(0x7f0000000080)}, {&(0x7f00000001c0)="c7", 0x1, 0x4af675a}, {0x0}]) [ 1739.299119][T25556] usb 2-1: USB disconnect, device number 71 [ 1739.311789][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x49, 0x0}, 0x40037063) 07:58:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000200000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:03 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:03 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x5, 0x0, 0x6, 0x0, 0x1}, 0x40) [ 1739.781234][T25556] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 1740.021238][T25556] usb 2-1: Using ep0 maxpacket: 8 [ 1740.141271][T25556] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1740.152306][T25556] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1740.161791][T25556] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1740.173954][T25556] usb 2-1: config 0 descriptor?? [ 1740.431941][T25556] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 07:58:06 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:58:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000250000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:06 executing program 3: bpf$PROG_LOAD(0x1c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x74) 07:58:06 executing program 2: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) [ 1742.374473][T13574] usb 2-1: USB disconnect, device number 72 [ 1742.400390][T13574] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:06 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f0000000200)) 07:58:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000003f0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:06 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:06 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:06 executing program 3: openat$random(0xffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000340)="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", &(0x7f00000000c0)=@tcp}, 0x72) [ 1742.901222][T13574] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 1743.161265][T13574] usb 2-1: Using ep0 maxpacket: 8 [ 1743.281586][T13574] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1743.292512][T13574] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1743.302661][T13574] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1743.314971][T13574] usb 2-1: config 0 descriptor?? [ 1743.574638][T13574] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 07:58:09 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:58:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000005c0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:09 executing program 3: r0 = io_uring_setup(0x5896, &(0x7f0000000240)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000001c0)={0x4}, 0x4) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4000000000000071) 07:58:09 executing program 2: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) [ 1745.431535][T25556] usb 2-1: USB disconnect, device number 73 [ 1745.438484][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected [ 1745.461326][ T8085] ================================================================== [ 1745.469455][ T8085] BUG: KCSAN: data-race in wb_timer_fn / wbt_inflight_cb [ 1745.476477][ T8085] [ 1745.478799][ T8085] write to 0xffff888103bdc904 of 4 bytes by interrupt on cpu 1: [ 1745.486556][ T8085] wb_timer_fn+0x42a/0xa00 [ 1745.490975][ T8085] blk_stat_timer_fn+0x3f4/0x410 [ 1745.495934][ T8085] call_timer_fn+0x2e/0x240 [ 1745.500452][ T8085] expire_timers+0x116/0x260 [ 1745.505052][ T8085] __run_timers+0x358/0x3f0 [ 1745.509557][ T8085] run_timer_softirq+0x19/0x30 [ 1745.514332][ T8085] __do_softirq+0x13c/0x2c3 [ 1745.518841][ T8085] __irq_exit_rcu+0xb4/0xc0 [ 1745.523401][ T8085] sysvec_apic_timer_interrupt+0x6e/0x80 [ 1745.529071][ T8085] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1745.535152][ T8085] kcsan_setup_watchpoint+0x436/0x470 [ 1745.540535][ T8085] __find_get_block+0x3a/0x640 [ 1745.545336][ T8085] find_inode_bit+0x1b8/0x3a0 [ 1745.550020][ T8085] __ext4_new_inode+0xb6c/0x2fe0 [ 1745.555669][ T8085] ext4_symlink+0x2d1/0x780 [ 1745.560191][ T8085] vfs_symlink+0xbe/0x170 [ 1745.564532][ T8085] do_symlinkat+0x11e/0x2b0 [ 1745.569043][ T8085] __x64_sys_symlink+0x32/0x40 [ 1745.573818][ T8085] do_syscall_64+0x39/0x80 [ 1745.578246][ T8085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1745.584157][ T8085] [ 1745.586477][ T8085] read to 0xffff888103bdc904 of 4 bytes by task 8085 on cpu 0: [ 1745.594016][ T8085] wbt_inflight_cb+0x3f/0x220 [ 1745.599766][ T8085] rq_qos_wait+0xac/0x220 [ 1745.604101][ T8085] wbt_wait+0x1bb/0x2b0 [ 1745.608257][ T8085] __rq_qos_throttle+0x39/0x70 [ 1745.613053][ T8085] blk_mq_submit_bio+0x253/0x1060 [ 1745.618080][ T8085] submit_bio_noacct+0x7c2/0x9a0 [ 1745.623026][ T8085] submit_bio+0x200/0x370 [ 1745.627456][ T8085] submit_bh_wbc+0x36b/0x3b0 [ 1745.632055][ T8085] __sync_dirty_buffer+0x136/0x1e0 [ 1745.637185][ T8085] sync_dirty_buffer+0x16/0x20 [ 1745.641967][ T8085] ext4_write_inode+0x285/0x390 [ 1745.646813][ T8085] write_inode+0x8c/0x1f0 [ 1745.651149][ T8085] __writeback_single_inode+0x286/0x4d0 [ 1745.656708][ T8085] writeback_single_inode+0x122/0x580 [ 1745.662104][ T8085] sync_inode_metadata+0x52/0x70 [ 1745.667132][ T8085] ext4_sync_file+0x359/0x6e0 [ 1745.671817][ T8085] vfs_fsync_range+0x107/0x120 [ 1745.676607][ T8085] ext4_buffered_write_iter+0x38f/0x3e0 07:58:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f00000a800000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:09 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:09 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000002500000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1745.682157][ T8085] ext4_file_write_iter+0x48a/0x10b0 [ 1745.687446][ T8085] vfs_write+0x6f9/0x7e0 [ 1745.691695][ T8085] ksys_write+0xce/0x180 [ 1745.695971][ T8085] __x64_sys_write+0x3e/0x50 [ 1745.700573][ T8085] do_syscall_64+0x39/0x80 [ 1745.705113][ T8085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1745.711371][ T8085] [ 1745.713712][ T8085] Reported by Kernel Concurrency Sanitizer on: [ 1745.719865][ T8085] CPU: 0 PID: 8085 Comm: rs:main Q:Reg Not tainted 5.12.0-rc6-syzkaller #0 07:58:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000fffe0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:10 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1745.728572][ T8085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1745.738729][ T8085] ================================================================== 07:58:10 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000005c00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) [ 1746.011265][T25556] usb 2-1: new high-speed USB device number 74 using dummy_hcd [ 1746.251236][T25556] usb 2-1: Using ep0 maxpacket: 8 [ 1746.371489][T25556] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1746.382523][T25556] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1746.392709][T25556] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1746.407315][T25556] usb 2-1: config 0 descriptor?? [ 1746.674911][T25556] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 07:58:12 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:58:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:58:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000ff0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb76904558464154202020000000000000000000000000000000000000000000000000000000fe00000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:12 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) [ 1748.531485][T25556] usb 2-1: USB disconnect, device number 74 [ 1748.563306][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000402000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000feff0000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:12 executing program 3: r0 = openat$vfio(0xffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x3b65, 0x0) 07:58:12 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:12 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) [ 1749.001327][T25556] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 1749.241286][T25556] usb 2-1: Using ep0 maxpacket: 8 [ 1749.362592][T25556] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1749.376626][T25556] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1749.386525][T25556] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1749.395513][T25556] usb 2-1: config 0 descriptor?? [ 1749.651744][T25556] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 07:58:15 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:58:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000800000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000280)=ANY=[], 0x1010) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000080)=""/96, 0x60}], 0x2, &(0x7f0000001280)=""/193, 0xc1}, 0x0) 07:58:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000204000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000250000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:15 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) [ 1751.611528][T25556] usb 2-1: USB disconnect, device number 75 [ 1751.618747][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:15 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000604000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:15 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000001740)=[{0x0}, {0x0, 0x0, 0x4af675a}]) 07:58:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000040000800000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:15 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:16 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:16 executing program 3: perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1752.131251][T25556] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 1752.371518][T25556] usb 2-1: Using ep0 maxpacket: 8 [ 1752.491731][T25556] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1752.502657][T25556] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1752.512540][T25556] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1752.521541][T25556] usb 2-1: config 0 descriptor?? 07:58:18 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001ddf8308c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x494, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC]) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/73, 0x49) 07:58:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000002000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:18 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000004c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:18 executing program 3: bpf$BPF_PROG_QUERY(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 07:58:18 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:18 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) [ 1754.684843][T25556] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 1754.715510][T25556] usb 2-1: USB disconnect, device number 76 07:58:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000001000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) [ 1754.747565][T25556] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected 07:58:19 executing program 5: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000040)="eb7690455846415420202000000000005c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {&(0x7f0000000600)}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}]}) 07:58:19 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) 07:58:19 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="eb769045584641542020200000000000000000000000000000000000000000000000000000000406000000000000000000000000000000000000000000000000030000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f00000000c0)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000000480)) 07:58:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000013000000300000000f000000000020000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000002000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000012700)="20000000d4c49a2ed4c49a2e00000000e1f4655f000000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 07:58:19 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001740)=[{&(0x7f0000000080)="ef", 0x1}]) [ 1755.151246][T25556] usb 2-1: new high-speed USB device number 77 using dummy_hcd [ 1755.391271][T25556] usb 2-1: Using ep0 maxpacket: 8