0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:18:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x400000, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x88, 0x1, &(0x7f0000000080), 0x4) r8 = fcntl$dupfd(r7, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 384.123915][T29599] FAULT_INJECTION: forcing a failure. [ 384.123915][T29599] name failslab, interval 1, probability 0, space 0, times 0 [ 384.143444][T29599] CPU: 0 PID: 29599 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 384.153750][T29599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.163801][T29599] Call Trace: [ 384.167091][T29599] dump_stack+0x1b0/0x228 [ 384.171422][T29599] ? devkmsg_release+0x127/0x127 [ 384.176352][T29599] ? alloc_file_pseudo+0x128/0x310 [ 384.181484][T29599] ? show_regs_print_info+0x18/0x18 [ 384.186691][T29599] should_fail+0x6fb/0x860 [ 384.191213][T29599] ? setup_fault_attr+0x2b0/0x2b0 [ 384.196234][T29599] ? should_fail+0x182/0x860 [ 384.200834][T29599] ? setup_fault_attr+0x2b0/0x2b0 [ 384.205945][T29599] __should_failslab+0x11a/0x160 [ 384.210883][T29599] ? security_file_alloc+0x36/0x210 [ 384.216085][T29599] should_failslab+0x9/0x20 [ 384.220608][T29599] kmem_cache_alloc+0x37/0x2b0 [ 384.225394][T29599] security_file_alloc+0x36/0x210 [ 384.230422][T29599] __alloc_file+0xd2/0x3b0 [ 384.234920][T29599] alloc_empty_file+0xac/0x1b0 [ 384.239678][T29599] alloc_file+0x5b/0x4b0 [ 384.243919][T29599] ? _raw_spin_unlock+0x9/0x20 [ 384.248680][T29599] alloc_file_pseudo+0x25b/0x310 [ 384.253618][T29599] ? alloc_empty_file_noaccount+0x80/0x80 [ 384.259336][T29599] ? __kasan_check_write+0x14/0x20 [ 384.264454][T29599] ? clear_nlink+0x87/0xe0 [ 384.268863][T29599] __shmem_file_setup+0x1a2/0x280 [ 384.273910][T29599] shmem_file_setup+0x2f/0x40 [ 384.278585][T29599] __se_sys_memfd_create+0x215/0x3e0 [ 384.283876][T29599] __x64_sys_memfd_create+0x5b/0x70 [ 384.289078][T29599] do_syscall_64+0xc0/0x100 [ 384.293579][T29599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 384.299576][T29599] RIP: 0033:0x45c6c9 [ 384.303463][T29599] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.323067][T29599] RSP: 002b:00007f1f970c9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 384.331474][T29599] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 000000000045c6c9 [ 384.339469][T29599] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1778 [ 384.347443][T29599] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 384.355445][T29599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 384.363411][T29599] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 0000000000000006 14:19:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008106e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000025fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:00 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r9) sendmsg$unix(r10, &(0x7f0000000640)={&(0x7f0000000140)=@abs={0x7f5244fa0c2edbd4, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, 0x0, 0x1e}, 0x41) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 384.657053][T29637] FAULT_INJECTION: forcing a failure. [ 384.657053][T29637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.672317][T29637] CPU: 0 PID: 29637 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 384.683818][T29637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.694230][T29637] Call Trace: [ 384.697530][T29637] dump_stack+0x1b0/0x228 [ 384.701897][T29637] ? devkmsg_release+0x127/0x127 [ 384.706867][T29637] ? show_regs_print_info+0x18/0x18 [ 384.712673][T29637] ? __rcu_read_lock+0x50/0x50 [ 384.717440][T29637] ? unwind_next_frame+0x415/0x870 [ 384.722564][T29637] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 384.728570][T29637] should_fail+0x6fb/0x860 [ 384.733002][T29637] ? setup_fault_attr+0x2b0/0x2b0 [ 384.738041][T29637] ? stack_trace_save+0x1e0/0x1e0 [ 384.743225][T29637] ? __kernel_text_address+0x9a/0x110 [ 384.748637][T29637] should_fail_alloc_page+0x4f/0x60 [ 384.753844][T29637] __alloc_pages_nodemask+0x274/0x3010 [ 384.759314][T29637] ? __rcu_read_lock+0x50/0x50 [ 384.767924][T29637] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 384.773305][T29637] ? avc_denied+0x1b0/0x1b0 [ 384.777896][T29637] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 384.783440][T29637] ? find_get_entry+0x5da/0x670 [ 384.788294][T29637] ? selinux_vm_enough_memory+0x100/0x160 [ 384.794032][T29637] ? selinux_syslog+0x120/0x120 [ 384.798885][T29637] ? percpu_counter_add_batch+0x136/0x160 [ 384.804597][T29637] ? __kasan_check_read+0x11/0x20 [ 384.809622][T29637] ? __vm_enough_memory+0x118/0x310 [ 384.814824][T29637] shmem_getpage_gfp+0xe79/0x2400 [ 384.819845][T29637] ? _raw_spin_lock+0xa1/0x170 [ 384.824595][T29637] ? shmem_getpage+0xa0/0xa0 [ 384.829169][T29637] ? iov_iter_fault_in_readable+0x2bd/0x5c0 [ 384.835135][T29637] ? uuid_parse+0x400/0x400 [ 384.839647][T29637] shmem_write_begin+0xc6/0x1b0 [ 384.844483][T29637] generic_perform_write+0x271/0x530 [ 384.849872][T29637] ? grab_cache_page_write_begin+0xa0/0xa0 [ 384.855664][T29637] ? file_remove_privs+0x630/0x630 [ 384.860809][T29637] ? __kasan_check_write+0x14/0x20 [ 384.865926][T29637] ? down_write+0xd8/0x150 [ 384.870351][T29637] __generic_file_write_iter+0x22c/0x470 [ 384.875981][T29637] ? memset+0x31/0x40 [ 384.879967][T29637] generic_file_write_iter+0x4b1/0x660 [ 384.885444][T29637] __vfs_write+0x579/0x700 [ 384.889867][T29637] ? __kernel_write+0x350/0x350 [ 384.895136][T29637] ? security_file_permission+0x157/0x350 [ 384.901090][T29637] ? rw_verify_area+0x1c2/0x360 [ 384.905940][T29637] vfs_write+0x203/0x4e0 [ 384.910795][T29637] __x64_sys_pwrite64+0x1af/0x240 [ 384.915814][T29637] ? ksys_pwrite64+0x1d0/0x1d0 [ 384.920580][T29637] ? syscall_return_slowpath+0x6f/0x500 [ 384.926124][T29637] do_syscall_64+0xc0/0x100 [ 384.930632][T29637] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 384.936641][T29637] RIP: 0033:0x4164c7 [ 384.940548][T29637] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 384.960165][T29637] RSP: 002b:00007f1f970c9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 384.968584][T29637] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 00000000004164c7 [ 384.976595][T29637] RDX: 0000000000000017 RSI: 0000000020010000 RDI: 0000000000000004 [ 384.984576][T29637] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 384.992563][T29637] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 385.000662][T29637] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 0000000000000007 14:19:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000040fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x101000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000200)=""/252) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSIG(r5, 0x40045436, 0x3) sendfile(r2, r1, 0x0, 0x80000005) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 14:19:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 385.016961][T29637] FAT-fs (loop2): bogus number of reserved sectors [ 385.034635][T29637] FAT-fs (loop2): Can't find a valid FAT filesystem 14:19:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008107e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000048fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 385.059509][T29644] __nla_validate_parse: 9 callbacks suppressed [ 385.059515][T29644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 385.066633][T29646] selinux_nlmsg_perm: 243 callbacks suppressed [ 385.066643][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.094492][T29650] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000000004cfe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:00 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 385.104220][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.118057][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.177069][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.177965][T29647] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=29647 comm=syz-executor.1 [ 385.205586][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.212192][T29666] FAULT_INJECTION: forcing a failure. [ 385.212192][T29666] name failslab, interval 1, probability 0, space 0, times 0 [ 385.233118][T29666] CPU: 1 PID: 29666 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 385.237941][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.243287][T29666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.243292][T29666] Call Trace: [ 385.243317][T29666] dump_stack+0x1b0/0x228 [ 385.243329][T29666] ? devkmsg_release+0x127/0x127 [ 385.243339][T29666] ? show_regs_print_info+0x18/0x18 [ 385.243348][T29666] ? memset+0x31/0x40 [ 385.243364][T29666] should_fail+0x6fb/0x860 [ 385.243375][T29666] ? setup_fault_attr+0x2b0/0x2b0 [ 385.243382][T29666] ? memset+0x31/0x40 [ 385.243391][T29666] __should_failslab+0x11a/0x160 [ 385.243399][T29666] ? getname_flags+0xba/0x640 [ 385.243406][T29666] should_failslab+0x9/0x20 [ 385.243414][T29666] kmem_cache_alloc+0x37/0x2b0 [ 385.243421][T29666] getname_flags+0xba/0x640 [ 385.243427][T29666] getname+0x19/0x20 [ 385.243442][T29666] do_sys_open+0x32a/0x7a0 [ 385.334664][T29666] ? file_open_root+0x440/0x440 [ 385.339510][T29666] ? __kasan_check_read+0x11/0x20 [ 385.344653][T29666] ? ksys_pwrite64+0x1d0/0x1d0 [ 385.349419][T29666] __x64_sys_open+0x87/0x90 [ 385.353929][T29666] do_syscall_64+0xc0/0x100 [ 385.358534][T29666] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.364415][T29666] RIP: 0033:0x416461 [ 385.368317][T29666] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 385.387913][T29666] RSP: 002b:00007f1f970c9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 385.396318][T29666] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 0000000000416461 [ 385.404285][T29666] RDX: 00007f1f970c9b0a RSI: 0000000000000002 RDI: 00007f1f970c9b00 [ 385.412263][T29666] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 385.420339][T29666] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 14:19:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008108e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 385.428311][T29666] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 0000000000000008 [ 385.437240][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 14:19:01 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 385.475407][T29663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 385.518287][T29646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.5 [ 385.522902][T29668] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=29668 comm=syz-executor.1 14:19:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000060fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008109e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 385.666047][T29686] FAULT_INJECTION: forcing a failure. [ 385.666047][T29686] name failslab, interval 1, probability 0, space 0, times 0 [ 385.679530][T29686] CPU: 1 PID: 29686 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 385.686596][T29690] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 385.689694][T29686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.689699][T29686] Call Trace: [ 385.689722][T29686] dump_stack+0x1b0/0x228 [ 385.689744][T29686] ? devkmsg_release+0x127/0x127 [ 385.721964][T29686] ? show_regs_print_info+0x18/0x18 [ 385.727196][T29686] should_fail+0x6fb/0x860 [ 385.731743][T29686] ? setup_fault_attr+0x2b0/0x2b0 [ 385.736760][T29686] ? __rcu_read_lock+0x50/0x50 [ 385.741520][T29686] __should_failslab+0x11a/0x160 [ 385.746457][T29686] ? __alloc_file+0x29/0x3b0 [ 385.751034][T29686] should_failslab+0x9/0x20 [ 385.755536][T29686] kmem_cache_alloc+0x37/0x2b0 [ 385.760466][T29686] ? is_bpf_text_address+0x2c8/0x2e0 [ 385.765848][T29686] __alloc_file+0x29/0x3b0 [ 385.770268][T29686] ? alloc_empty_file+0x4c/0x1b0 [ 385.775272][T29686] alloc_empty_file+0xac/0x1b0 [ 385.780046][T29686] path_openat+0x124/0x42d0 [ 385.784793][T29686] ? stack_trace_save+0x111/0x1e0 [ 385.790171][T29686] ? stack_trace_snprint+0x150/0x150 [ 385.795456][T29686] ? generic_perform_write+0x48d/0x530 [ 385.800913][T29686] ? __kasan_kmalloc+0x179/0x1b0 [ 385.805850][T29686] ? do_filp_open+0x430/0x430 [ 385.810537][T29686] ? getname_flags+0xba/0x640 [ 385.815396][T29686] ? getname+0x19/0x20 [ 385.819502][T29686] ? do_sys_open+0x32a/0x7a0 [ 385.824088][T29686] ? __x64_sys_open+0x87/0x90 [ 385.828767][T29686] ? do_syscall_64+0xc0/0x100 [ 385.833447][T29686] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.839524][T29686] ? __kasan_check_write+0x14/0x20 [ 385.844637][T29686] ? up_write+0xa1/0x190 [ 385.848889][T29686] ? __kasan_check_write+0x14/0x20 [ 385.853996][T29686] ? down_write+0xd8/0x150 [ 385.858513][T29686] ? up_read+0x10/0x10 [ 385.862580][T29686] ? __generic_file_write_iter+0x247/0x470 [ 385.868486][T29686] ? memset+0x31/0x40 [ 385.872496][T29686] ? expand_files+0xd1/0x970 [ 385.877214][T29686] do_filp_open+0x1f7/0x430 [ 385.882764][T29686] ? vfs_tmpfile+0x230/0x230 [ 385.887360][T29686] ? __kasan_check_write+0x14/0x20 [ 385.892641][T29686] ? _raw_spin_lock+0xa1/0x170 [ 385.897411][T29686] ? _raw_spin_trylock_bh+0x190/0x190 [ 385.902835][T29686] ? __kasan_check_read+0x11/0x20 [ 385.908313][T29686] ? __check_object_size+0x309/0x3d0 [ 385.913594][T29686] ? _raw_spin_unlock+0x9/0x20 [ 385.918357][T29686] ? get_unused_fd_flags+0x97/0xb0 [ 385.923467][T29686] do_sys_open+0x36f/0x7a0 [ 385.927894][T29686] ? file_open_root+0x440/0x440 [ 385.932728][T29686] ? __kasan_check_read+0x11/0x20 [ 385.937742][T29686] ? ksys_pwrite64+0x1d0/0x1d0 [ 385.942513][T29686] __x64_sys_open+0x87/0x90 [ 385.947015][T29686] do_syscall_64+0xc0/0x100 [ 385.951945][T29686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.958713][T29686] RIP: 0033:0x416461 [ 385.962596][T29686] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 385.982391][T29686] RSP: 002b:00007f1f970c9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 385.990911][T29686] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 0000000000416461 [ 385.999097][T29686] RDX: 00007f1f970c9b0a RSI: 0000000000000002 RDI: 00007f1f970c9b00 [ 386.007080][T29686] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a 14:19:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="71686f77657865632c6e6f63e473652c00"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:01 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 386.015151][T29686] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 386.023115][T29686] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 0000000000000009 14:19:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000068fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810be63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r9) r11 = accept$unix(r9, 0x0, &(0x7f0000000100)) sendmsg$unix(r11, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0xfffffffffffffcb9}, 0x8800) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 386.109163][T29704] FAULT_INJECTION: forcing a failure. [ 386.109163][T29704] name failslab, interval 1, probability 0, space 0, times 0 [ 386.123906][T29707] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 386.126144][T29709] FAT-fs (loop1): Unrecognized mount option "qhowexec" or missing value [ 386.154781][T29704] CPU: 0 PID: 29704 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 386.165317][T29704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.175368][T29704] Call Trace: [ 386.178673][T29704] dump_stack+0x1b0/0x228 [ 386.183005][T29704] ? devkmsg_release+0x127/0x127 [ 386.188042][T29704] ? show_regs_print_info+0x18/0x18 [ 386.193240][T29704] should_fail+0x6fb/0x860 [ 386.197646][T29704] ? setup_fault_attr+0x2b0/0x2b0 [ 386.202682][T29704] ? should_fail+0x182/0x860 [ 386.207272][T29704] ? __read_once_size_nocheck+0x10/0x10 [ 386.214134][T29704] ? unwind_next_frame+0x415/0x870 [ 386.219250][T29704] ? setup_fault_attr+0x2b0/0x2b0 [ 386.224271][T29704] __should_failslab+0x11a/0x160 [ 386.229644][T29704] ? security_file_alloc+0x36/0x210 [ 386.234866][T29704] should_failslab+0x9/0x20 [ 386.239399][T29704] kmem_cache_alloc+0x37/0x2b0 [ 386.244179][T29704] security_file_alloc+0x36/0x210 [ 386.249210][T29704] __alloc_file+0xd2/0x3b0 [ 386.253639][T29704] alloc_empty_file+0xac/0x1b0 [ 386.258399][T29704] path_openat+0x124/0x42d0 [ 386.263010][T29704] ? stack_trace_save+0x111/0x1e0 [ 386.268031][T29704] ? stack_trace_snprint+0x150/0x150 [ 386.273310][T29704] ? generic_perform_write+0x48d/0x530 [ 386.278862][T29704] ? __kasan_kmalloc+0x179/0x1b0 [ 386.283800][T29704] ? do_filp_open+0x430/0x430 [ 386.288491][T29704] ? getname_flags+0xba/0x640 [ 386.293293][T29704] ? getname+0x19/0x20 [ 386.297394][T29704] ? do_sys_open+0x32a/0x7a0 [ 386.301982][T29704] ? __x64_sys_open+0x87/0x90 [ 386.306666][T29704] ? do_syscall_64+0xc0/0x100 [ 386.311330][T29704] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 386.317392][T29704] ? __kasan_check_write+0x14/0x20 [ 386.322603][T29704] ? up_write+0xa1/0x190 [ 386.326955][T29704] ? __kasan_check_write+0x14/0x20 [ 386.332066][T29704] ? down_write+0xd8/0x150 [ 386.336478][T29704] ? up_read+0x10/0x10 [ 386.340548][T29704] ? __generic_file_write_iter+0x247/0x470 [ 386.346395][T29704] ? memset+0x31/0x40 [ 386.350390][T29704] ? expand_files+0xd1/0x970 [ 386.354965][T29704] do_filp_open+0x1f7/0x430 [ 386.359567][T29704] ? vfs_tmpfile+0x230/0x230 [ 386.364273][T29704] ? __kasan_check_write+0x14/0x20 [ 386.369400][T29704] ? _raw_spin_lock+0xa1/0x170 [ 386.374637][T29704] ? _raw_spin_trylock_bh+0x190/0x190 [ 386.380005][T29704] ? __kasan_check_read+0x11/0x20 [ 386.385159][T29704] ? __check_object_size+0x309/0x3d0 [ 386.390465][T29704] ? _raw_spin_unlock+0x9/0x20 [ 386.395357][T29704] ? get_unused_fd_flags+0x97/0xb0 [ 386.400497][T29704] do_sys_open+0x36f/0x7a0 [ 386.404927][T29704] ? switch_fpu_return+0x10/0x10 [ 386.409862][T29704] ? file_open_root+0x440/0x440 [ 386.414705][T29704] ? __kasan_check_read+0x11/0x20 [ 386.419850][T29704] ? ksys_pwrite64+0x1d0/0x1d0 [ 386.424629][T29704] __x64_sys_open+0x87/0x90 [ 386.429134][T29704] do_syscall_64+0xc0/0x100 [ 386.433720][T29704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 386.439726][T29704] RIP: 0033:0x416461 [ 386.443633][T29704] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 386.463233][T29704] RSP: 002b:00007f1f970c9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 386.471649][T29704] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 0000000000416461 [ 386.479624][T29704] RDX: 00007f1f970c9b0a RSI: 0000000000000002 RDI: 00007f1f970c9b00 [ 386.487769][T29704] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 386.495910][T29704] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 14:19:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000000006cfe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ce63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 386.503894][T29704] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 000000000000000a 14:19:02 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 386.645434][T29709] FAT-fs (loop1): Unrecognized mount option "qhowexec" or missing value [ 386.645576][T29734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810de63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x120, r3, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x4f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x29, 0x10}}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x12}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4004041}, 0x60008000) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x80000005) 14:19:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000074fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 386.740091][T29741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 386.756912][T29739] FAULT_INJECTION: forcing a failure. [ 386.756912][T29739] name failslab, interval 1, probability 0, space 0, times 0 [ 386.779350][T29739] CPU: 0 PID: 29739 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 386.789623][T29739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.799954][T29739] Call Trace: [ 386.803261][T29739] dump_stack+0x1b0/0x228 [ 386.807607][T29739] ? devkmsg_release+0x127/0x127 [ 386.812542][T29739] ? show_regs_print_info+0x18/0x18 [ 386.817738][T29739] should_fail+0x6fb/0x860 [ 386.822152][T29739] ? setup_fault_attr+0x2b0/0x2b0 [ 386.827180][T29739] ? __kasan_check_write+0x14/0x20 [ 386.832308][T29739] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 386.838037][T29739] __should_failslab+0x11a/0x160 [ 386.842971][T29739] ? __kthread_create_on_node+0x142/0x470 [ 386.848791][T29739] should_failslab+0x9/0x20 [ 386.853323][T29739] kmem_cache_alloc_trace+0x3a/0x2f0 [ 386.858772][T29739] ? __kasan_check_write+0x14/0x20 [ 386.863907][T29739] ? __up_read+0x6f/0x1b0 [ 386.868318][T29739] ? loop_set_fd+0x1280/0x1280 [ 386.873093][T29739] __kthread_create_on_node+0x142/0x470 [ 386.878639][T29739] ? kthread_create_on_node+0x110/0x110 [ 386.884311][T29739] ? _raw_spin_unlock+0x9/0x20 [ 386.889084][T29739] ? bd_start_claiming+0x469/0x550 [ 386.894194][T29739] ? loop_set_fd+0x1280/0x1280 [ 386.898990][T29739] kthread_create_on_node+0xc6/0x110 [ 386.904286][T29739] ? tsk_fork_get_node+0x10/0x10 [ 386.909383][T29739] ? mutex_lock_killable+0xa6/0x120 [ 386.914578][T29739] ? memset+0x31/0x40 [ 386.918708][T29739] loop_set_fd+0x69d/0x1280 [ 386.923216][T29739] lo_ioctl+0x17a/0x2340 [ 386.927444][T29739] ? __kasan_check_read+0x11/0x20 [ 386.932586][T29739] ? perf_pmu_sched_task+0x370/0x370 [ 386.937998][T29739] ? __kasan_check_read+0x11/0x20 [ 386.943078][T29739] ? lo_release+0x1f0/0x1f0 [ 386.947701][T29739] ? _raw_spin_unlock_irq+0x9/0x20 [ 386.952820][T29739] ? finish_task_switch+0x274/0x560 [ 386.958011][T29739] ? __schedule+0xea0/0x1700 [ 386.962601][T29739] ? __kasan_check_write+0x14/0x20 [ 386.967708][T29739] ? _raw_spin_lock+0xa1/0x170 [ 386.972594][T29739] ? _raw_spin_trylock_bh+0x190/0x190 [ 386.978097][T29739] ? schedule+0x14b/0x1d0 [ 386.982412][T29739] ? _raw_spin_unlock+0x9/0x20 [ 386.987170][T29739] ? __mutex_lock+0xabf/0xc40 [ 386.991848][T29739] ? stack_trace_save+0x1e0/0x1e0 [ 386.997008][T29739] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 387.003766][T29739] ? __kasan_check_write+0x14/0x20 [ 387.008888][T29739] ? mutex_lock+0xa6/0x110 [ 387.013310][T29739] ? __module_put_and_exit+0x20/0x20 [ 387.018582][T29739] ? __kasan_check_write+0x14/0x20 [ 387.023698][T29739] ? __up_read+0x6f/0x1b0 [ 387.028111][T29739] ? disk_check_events+0x600/0x600 [ 387.033355][T29739] ? __kasan_check_write+0x14/0x20 [ 387.038554][T29739] ? up_write+0xa1/0x190 [ 387.042790][T29739] ? __kasan_check_write+0x14/0x20 [ 387.048033][T29739] ? down_write+0xd8/0x150 [ 387.052453][T29739] ? up_read+0x10/0x10 [ 387.056524][T29739] ? __kasan_check_write+0x14/0x20 [ 387.061631][T29739] ? disk_unblock_events+0x51/0x60 [ 387.066731][T29739] ? __blkdev_get+0x125b/0x1b40 [ 387.071695][T29739] ? __read_once_size_nocheck+0x10/0x10 [ 387.077232][T29739] ? unwind_next_frame+0x415/0x870 [ 387.082621][T29739] ? __rcu_read_lock+0x50/0x50 [ 387.087439][T29739] ? unwind_next_frame+0x415/0x870 [ 387.092663][T29739] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 387.098635][T29739] ? is_bpf_text_address+0x2c8/0x2e0 [ 387.103906][T29739] ? lo_release+0x1f0/0x1f0 [ 387.108409][T29739] blkdev_ioctl+0x89a/0x2c30 [ 387.113015][T29739] ? __kernel_text_address+0x9a/0x110 [ 387.118437][T29739] ? unwind_get_return_address+0x4c/0x90 [ 387.124380][T29739] ? arch_stack_walk+0x98/0xe0 [ 387.129325][T29739] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 387.134626][T29739] ? __rcu_read_lock+0x50/0x50 [ 387.139383][T29739] ? stack_trace_save+0x111/0x1e0 [ 387.144401][T29739] ? avc_has_extended_perms+0xb27/0x10d0 [ 387.150021][T29739] ? __kasan_slab_free+0x1e2/0x220 [ 387.155236][T29739] ? __kasan_slab_free+0x168/0x220 [ 387.160333][T29739] ? kasan_slab_free+0xe/0x10 [ 387.165001][T29739] ? kmem_cache_free+0x181/0x7a0 [ 387.169939][T29739] ? avc_ss_reset+0x3e0/0x3e0 [ 387.174609][T29739] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 387.180782][T29739] ? up_write+0xa1/0x190 [ 387.185020][T29739] ? __kasan_check_write+0x14/0x20 [ 387.190126][T29739] ? down_write+0xd8/0x150 [ 387.194535][T29739] ? up_read+0x10/0x10 [ 387.198586][T29739] ? __generic_file_write_iter+0x247/0x470 [ 387.204480][T29739] ? memset+0x31/0x40 [ 387.208446][T29739] ? expand_files+0xd1/0x970 [ 387.213025][T29739] ? do_filp_open+0x2e1/0x430 [ 387.217964][T29739] ? memset+0x31/0x40 [ 387.221927][T29739] block_ioctl+0xbd/0x100 [ 387.226247][T29739] ? blkdev_iopoll+0x100/0x100 [ 387.231021][T29739] do_vfs_ioctl+0x747/0x1700 [ 387.235716][T29739] ? selinux_file_ioctl+0x6e6/0x930 [ 387.240988][T29739] ? ioctl_preallocate+0x240/0x240 [ 387.246102][T29739] ? __fget+0x37c/0x3c0 [ 387.250242][T29739] ? __kasan_check_write+0x14/0x20 [ 387.255342][T29739] ? fget_many+0x30/0x30 [ 387.259583][T29739] ? security_file_ioctl+0xae/0xd0 [ 387.264831][T29739] __x64_sys_ioctl+0xe3/0x120 [ 387.269729][T29739] do_syscall_64+0xc0/0x100 [ 387.274215][T29739] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 387.280090][T29739] RIP: 0033:0x45c537 [ 387.283981][T29739] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.303796][T29739] RSP: 002b:00007f1f970c9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 387.312195][T29739] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 000000000045c537 [ 387.320163][T29739] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 387.328366][T29739] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a 14:19:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x6, 0xa, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717100109ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d38424eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500000000000000000000000000e55c0000"], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r12, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r14, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) socket$inet6(0xa, 0x6, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) setsockopt$TIPC_MCAST_BROADCAST(r17, 0x10f, 0x85) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000000007afe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000000080fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 387.336330][T29739] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 387.344329][T29739] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 000000000000000b [ 387.380549][T29750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 387.417396][T29758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:03 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ee63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$GIO_SCRNMAP(r11, 0x4b40, &(0x7f00000001c0)=""/168) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000ffffff80fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 387.539420][T29780] FAULT_INJECTION: forcing a failure. [ 387.539420][T29780] name failslab, interval 1, probability 0, space 0, times 0 [ 387.570207][T29792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 387.591428][T29780] CPU: 1 PID: 29780 Comm: syz-executor.2 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 387.601692][T29780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.611767][T29780] Call Trace: [ 387.615070][T29780] dump_stack+0x1b0/0x228 [ 387.619404][T29780] ? devkmsg_release+0x127/0x127 [ 387.624349][T29780] ? blkdev_ioctl+0x89a/0x2c30 [ 387.629173][T29780] ? show_regs_print_info+0x18/0x18 [ 387.634381][T29780] ? do_syscall_64+0xc0/0x100 [ 387.639059][T29780] ? __kasan_check_read+0x11/0x20 [ 387.644088][T29780] should_fail+0x6fb/0x860 [ 387.648503][T29780] ? setup_fault_attr+0x2b0/0x2b0 [ 387.653693][T29780] __should_failslab+0x11a/0x160 [ 387.658628][T29780] ? __kernfs_new_node+0xdb/0x6e0 [ 387.663784][T29780] should_failslab+0x9/0x20 [ 387.668310][T29780] kmem_cache_alloc+0x37/0x2b0 [ 387.673073][T29780] __kernfs_new_node+0xdb/0x6e0 [ 387.677929][T29780] ? kernfs_new_node+0x170/0x170 [ 387.682866][T29780] ? enqueue_task_fair+0x2255/0x24a0 [ 387.688172][T29780] ? update_load_avg+0x4a7/0x1350 [ 387.693298][T29780] kernfs_create_dir_ns+0x9b/0x230 [ 387.698545][T29780] internal_create_group+0x234/0xe40 [ 387.703838][T29780] ? __kasan_check_write+0x14/0x20 [ 387.708948][T29780] ? __kasan_check_write+0x14/0x20 [ 387.714063][T29780] ? down_write+0xd8/0x150 [ 387.718486][T29780] ? sysfs_create_group+0x30/0x30 [ 387.723522][T29780] sysfs_create_group+0x1f/0x30 [ 387.728359][T29780] loop_set_fd+0xdbd/0x1280 [ 387.732859][T29780] lo_ioctl+0x17a/0x2340 [ 387.737220][T29780] ? lo_release+0x1f0/0x1f0 [ 387.741747][T29780] ? __read_once_size_nocheck+0x10/0x10 [ 387.747436][T29780] ? unwind_next_frame+0x415/0x870 [ 387.752577][T29780] ? __rcu_read_lock+0x50/0x50 [ 387.757343][T29780] ? unwind_next_frame+0x415/0x870 [ 387.762448][T29780] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 387.768433][T29780] ? 0xffffffffa0008000 [ 387.772695][T29780] ? is_bpf_text_address+0x2c8/0x2e0 [ 387.777983][T29780] ? stack_trace_save+0x1e0/0x1e0 [ 387.783026][T29780] ? __kasan_check_write+0x14/0x20 [ 387.788380][T29780] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 387.794015][T29780] ? kobj_kset_leave+0x3a0/0x3a0 [ 387.798962][T29780] ? __kasan_check_write+0x14/0x20 [ 387.804337][T29780] ? mutex_lock+0xa6/0x110 [ 387.808861][T29780] ? __module_put_and_exit+0x20/0x20 [ 387.814154][T29780] ? __kasan_check_write+0x14/0x20 [ 387.819262][T29780] ? __up_read+0x6f/0x1b0 [ 387.823698][T29780] ? disk_check_events+0x600/0x600 [ 387.828818][T29780] ? __kasan_check_write+0x14/0x20 [ 387.833928][T29780] ? up_write+0xa1/0x190 [ 387.838199][T29780] ? __kasan_check_write+0x14/0x20 [ 387.843310][T29780] ? down_write+0xd8/0x150 [ 387.848009][T29780] ? up_read+0x10/0x10 [ 387.852076][T29780] ? __kasan_check_write+0x14/0x20 [ 387.857325][T29780] ? disk_unblock_events+0x51/0x60 [ 387.862433][T29780] ? __blkdev_get+0x125b/0x1b40 [ 387.867292][T29780] ? __read_once_size_nocheck+0x10/0x10 [ 387.872839][T29780] ? unwind_next_frame+0x415/0x870 [ 387.877947][T29780] ? __rcu_read_lock+0x50/0x50 [ 387.882710][T29780] ? unwind_next_frame+0x415/0x870 [ 387.887822][T29780] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 387.893801][T29780] ? 0xffffffffa0008000 [ 387.897962][T29780] ? is_bpf_text_address+0x2c8/0x2e0 [ 387.903244][T29780] ? lo_release+0x1f0/0x1f0 [ 387.907746][T29780] blkdev_ioctl+0x89a/0x2c30 [ 387.912324][T29780] ? __kernel_text_address+0x9a/0x110 [ 387.917826][T29780] ? unwind_get_return_address+0x4c/0x90 [ 387.923462][T29780] ? arch_stack_walk+0x98/0xe0 [ 387.928988][T29780] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 387.934280][T29780] ? __rcu_read_lock+0x50/0x50 [ 387.939038][T29780] ? stack_trace_save+0x111/0x1e0 [ 387.944069][T29780] ? avc_has_extended_perms+0xb27/0x10d0 [ 387.949711][T29780] ? __kasan_slab_free+0x1e2/0x220 [ 387.954808][T29780] ? __kasan_slab_free+0x168/0x220 [ 387.959916][T29780] ? kasan_slab_free+0xe/0x10 [ 387.964706][T29780] ? kmem_cache_free+0x181/0x7a0 [ 387.969650][T29780] ? avc_ss_reset+0x3e0/0x3e0 [ 387.974462][T29780] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 387.980533][T29780] ? up_write+0xa1/0x190 [ 387.984793][T29780] ? __kasan_check_write+0x14/0x20 [ 387.989913][T29780] ? down_write+0xd8/0x150 [ 387.994426][T29780] ? up_read+0x10/0x10 [ 387.998505][T29780] ? __generic_file_write_iter+0x247/0x470 [ 388.004314][T29780] ? memset+0x31/0x40 [ 388.008297][T29780] ? expand_files+0xd1/0x970 [ 388.012887][T29780] ? do_filp_open+0x2e1/0x430 [ 388.017609][T29780] ? memset+0x31/0x40 [ 388.021604][T29780] block_ioctl+0xbd/0x100 [ 388.026057][T29780] ? blkdev_iopoll+0x100/0x100 [ 388.030844][T29780] do_vfs_ioctl+0x747/0x1700 [ 388.035430][T29780] ? selinux_file_ioctl+0x6e6/0x930 [ 388.040643][T29780] ? ioctl_preallocate+0x240/0x240 [ 388.045767][T29780] ? __fget+0x37c/0x3c0 [ 388.049970][T29780] ? fget_many+0x30/0x30 [ 388.054219][T29780] ? security_file_ioctl+0xae/0xd0 [ 388.059351][T29780] __x64_sys_ioctl+0xe3/0x120 [ 388.064037][T29780] do_syscall_64+0xc0/0x100 [ 388.068555][T29780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 388.074453][T29780] RIP: 0033:0x45c537 [ 388.078341][T29780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.097964][T29780] RSP: 002b:00007f1f970c9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 388.106488][T29780] RAX: ffffffffffffffda RBX: 00007f1f970ca6d4 RCX: 000000000045c537 [ 388.114454][T29780] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 388.122575][T29780] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 388.130702][T29780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 388.138678][T29780] R13: 0000000000000bae R14: 00000000004cdbd0 R15: 000000000000000c 14:19:03 executing program 1: pipe2(&(0x7f0000000080), 0x84000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x88, 0x1, &(0x7f0000000080), 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/ldiscs\x00', 0x0, 0x0) shutdown(r1, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="73686f7765786563456e6f636173652cfc565e0090b8d1c9d755a674bcf53900afedaa2b28b939253398d47b2753c3383a08bd6fcc5a3c053b538c72900671830acd793b7071b1840cac437f0fc747a64222428d6dc998ebabf14b4306a7bdabf1f35075d1ded928579c25ce7c2acdb0967d95e33cf35a0cb808ba0fe21f199b310c8cff7226a579028856c78a224b7d7d69ca07cbbe23513a947259c377eebf31093e4d8dd9533e9e01ccf4180797d7645236c8a058a49326c3f07dc2a4c12da36ea647bc91d7174a"]) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x80000005) 14:19:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000ffffff9efe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810fe63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000007fffeec4fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000007fffeed8fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:04 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x800, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000007c0)=@urb_type_iso={0x0, {0x8}, 0xfffff000, 0x80, &(0x7f0000000300)="810cdec9d7f27055e6c42586bb79b36e288ec191b5937ad6371aa2b2b8b3a149f59198d6984a1a0ef1a23de84d86cd0db7e8797a62c95547169e60153dd5febc870f2d1a0cbba84a8b856e243200aad9a3e58f3df70e03aa48d299126ba4a3e522c32c32697f2b753b868cc2c208d6b64e144b8270491424c7b2b6c516b6b1d00ee58ab020509c3eacec4d59adc6a984e59392ec956d", 0x96, 0x6, 0x6, 0x6c, 0x1, 0x2, &(0x7f00000003c0)="ac497fbd4c3fe7c2710ab043efbc0b1a3defa3a9d4185418dee89124c0d16b89843e368b8237c6170d53c518104a8c4010f0066a650a0d4714d64966a5032d8884685dfd336d769e4b1894c17c5ac1c356f51734cca1d9817200276ca55792b1f8de2799f8104758a4b45783f3bd286aa81640a265f25c2a45f79ad971802f9a44066167c5bf284603a6a5f7fd43ee6c002de9d34def5b4f107ae2f7c8eaeb88aa7473a464ccd31f025f03ac1ca49f7ddca997185951bb0f3072cdfa1f81cde1f129331968b0eac211ae6146e79a496c5e12c37d0ea05eb58a784cb53dc3304fa50f5384545e1c3bdd", [{0x800, 0x9, 0xa7}, {0x7, 0x2, 0x1}, {0x1, 0x2, 0x1}, {0x7, 0x7f, 0x7}, {0x1, 0x4, 0xfffffffa}, {0xfff, 0x8, 0x8001}, {0xffffffff, 0x2, 0x5}, {0x6, 0x5, 0x3}, {0x3, 0x3, 0x5}, {0x1, 0x4, 0xb3e0}, {0x4, 0xfffffff8, 0x6}, {0xffffd968, 0x5c}, {0x4, 0x7, 0xdc3a}, {0xa8, 0x0, 0x3ff}, {0x4, 0x5388, 0x2}, {0x0, 0x80, 0xfff}, {0x6, 0x8, 0x6}, {0x3, 0x5, 0x1}, {0x1000, 0x0, 0x2}, {0x2, 0x9, 0x36}, {0x5, 0x1ff, 0x494}, {0x5, 0x8000, 0x200}, {0x2, 0xfff, 0x7fffffff}, {0x7e27, 0x1, 0xbb9a}, {0x6ab, 0x7, 0xffffffe0}, {0x40, 0x6, 0x3}, {0x9, 0x200, 0x4}, {0x81, 0x8, 0x8}, {0x400, 0x4, 0x9}, {0x9, 0x80, 0x9}, {0x82, 0x20, 0xffffad10}, {0x2, 0x7ff, 0x3}, {0xffffffff, 0x5, 0x693}, {0x6, 0x3, 0x14}, {0x5, 0x8, 0x40}, {0x2, 0x27, 0x9}, {0xec3b, 0x0, 0x400}, {0x9, 0x2, 0xffffff01}, {0x1037, 0x1ff, 0x7}, {0x1004, 0x7, 0x3f}, {0xeda9, 0xfffffff9, 0x3}, {0x5, 0x8, 0xf}, {0x7fad0, 0x7, 0xfffffffa}, {0xfffffffb, 0x5, 0x7}, {0x6, 0x80000001, 0x7}, {0x1, 0x0, 0x8}, {0x9, 0xffffffff, 0x401}, {0x3, 0xffffffff, 0x30}, {0x80000000, 0x6, 0xfff}, {0xca, 0x200, 0x5}, {0xfb, 0x9, 0x5}, {0x1, 0xffffffff, 0x6e1f}, {0x0, 0x0, 0x1}, {0x9, 0xffff8001, 0x7}, {0x6cf, 0x1, 0x2408f581}, {0x0, 0x484, 0x3}, {0x8001, 0x17, 0x473bd3c0}, {0x0, 0x4, 0x5}, {0x61c, 0x3, 0x9}, {0x260, 0x3, 0x6}, {0x9, 0x1, 0x80000000}, {0x8000, 0x5, 0x400}, {0x9252, 0x6, 0x4}, {0x0, 0x3, 0xc6}, {0x4, 0x71, 0x8}, {0x6, 0x9, 0xfffffffe}, {0x200, 0x3, 0xfffffff7}, {0x6464, 0x4, 0x1}, {0x6, 0x3, 0x8}, {0x5, 0x6, 0x9c7}, {0x7, 0x7, 0x400}, {0x2, 0x8, 0xfff}, {0x7, 0x347, 0x6}, {0x6, 0x3, 0x2}, {0x3, 0x4, 0x1ff}, {0xffff8000, 0xffffffff, 0x803}, {0xffffffff, 0x400, 0x401}, {0x1, 0x0, 0x7ff}, {0x4, 0x10001, 0x562}, {0x4, 0x2, 0x777}, {0x2, 0xffffff00}, {0xffffff7b, 0x7, 0x1}, {0x6, 0x8b08, 0xbe2}, {0x8, 0x7fffffff, 0xff}, {0xfffffffd, 0x6}, {0xceea, 0x10001, 0x3f}, {0x1f}, {0xaa, 0x8000, 0x6}, {0x2, 0xfffffff8, 0x6}, {0x14, 0x5, 0x7}, {0x4, 0x8c4}, {0x9, 0x3}, {0xff4, 0x1, 0x1000}, {0xa62, 0xfff, 0x3ff}, {0x5, 0x94a, 0x7fffffff}, {0x2, 0x7f, 0xb0e8}, {0x1e3a, 0x6, 0x1}, {0x401, 0x401, 0xd}, {0x200, 0x401}, {0x93e, 0x3ff, 0x800}, {0x2, 0x52, 0x401}, {0xe1, 0x2, 0x3}, {0x3, 0x7f, 0x4}, {0x0, 0x8, 0x7}, {0x7, 0xffffffff, 0x6}, {0x0, 0x101, 0x1}, {0x80000001, 0x3, 0x6}, {0x4, 0x0, 0x6}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000780)=ANY=[@ANYRES16=r5], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x6c, r7, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}]}, 0x6c}}, 0x20000010) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x44, r7, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x73}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x13}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x47}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x5c}, 0x4040011) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r6, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) r13 = accept4$tipc(r4, 0x0, &(0x7f0000000100), 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r1, 0x0, r3, 0x0, 0x400000, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r14, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000280)={0x1c, r15, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x110}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000d40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r15, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "70fc355c57"}, @NL80211_ATTR_KEY={0x24, 0x50, 0x0, 0x1, [@NL80211_KEY_SEQ={0x8, 0x4, "e79c503f"}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}]}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "1ca609e09b6ad29c9a0ee5f4f3"}]}, 0x64}, 0x1, 0x0, 0x0, 0x44841}, 0x2400484c) 14:19:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000ffffffeafe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000ffffffeffe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_TIMEOUT(r10, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x7, 0x13}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008110e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 388.967636][T29838] FAT-fs (loop3): bogus number of reserved sectors [ 388.974299][T29838] FAT-fs (loop3): Can't find a valid FAT filesystem [ 389.056191][T29827] FAT-fs (loop1): Unrecognized mount option "showexecEnocase" or missing value 14:19:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@canfd={{}, 0x15, 0x1, 0x0, 0x0, "a151aa2c0b7432c112879645dc7fc413d130064a4506950c6b1f7e7b491ce837ca86985711dc79ede00a0618f38b606bfb599c27aec889138c94ca3f6507b71f"}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x800) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x624040, 0xe6) fsmount(r2, 0x0, 0x1f9) 14:19:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x57, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = accept(r5, 0x0, &(0x7f0000000480)) getsockopt$inet_mtu(r11, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x2400, 0x0) select(0x40, &(0x7f0000000100)={0x1, 0x8, 0x4, 0x2, 0x20, 0x4, 0x7, 0x4}, &(0x7f00000001c0)={0x3, 0x0, 0x2, 0x1000, 0x5, 0x300000000, 0x4, 0x2}, &(0x7f0000000200)={0x800, 0x6, 0xb156, 0x4, 0x5, 0x9, 0x6, 0x7}, &(0x7f0000000240)={0x77359400}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = syz_open_dev$tty20(0xc, 0x4, 0x1) r14 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r14, 0x88, 0x1, &(0x7f0000000080), 0x4) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe80) r18 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r18, 0x88, 0x1, &(0x7f0000000080), 0x4) fstat(r18, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r21, 0x0) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f0000000200)=[r23, 0x0]) r24 = getegid() r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f0000000200)=[r26, 0x0]) r27 = getgid() fsetxattr$system_posix_acl(r13, &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2, r15}, {0x2, 0x6, r17}, {0x2, 0x7, r19}, {0x2, 0x4, r21}], {0x4, 0x6}, [{0x8, 0x3, r23}, {0x8, 0x2, r24}, {0x8, 0x2, r26}, {0x8, 0x7, r27}], {0x10, 0x4}, {0x20, 0x6}}, 0x64, 0x3) r28 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r28, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0xffffffffffffffe0, 0x0) 14:19:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000fffffff0fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008111e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008112e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00002, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="73686f77657865632c6e6fb4a2c58d2c00"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x6a3, 0x6) 14:19:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000001f1fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/789], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000fffffffefe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008113e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 389.626956][T29886] FAT-fs (loop1): Unrecognized mount option "no´¢Å" or missing value 14:19:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000007ffffffffe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008114e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000fffffffffe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000240)={0x10000000}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r8, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) fsetxattr$security_evm(r13, &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@v1={0x2, "15"}, 0x2, 0x3) [ 389.818417][T29920] FAT-fs (loop3): bogus number of reserved sectors [ 389.825297][T29920] FAT-fs (loop3): Can't find a valid FAT filesystem [ 389.897247][T29886] FAT-fs (loop1): Unrecognized mount option "no´¢Å" or missing value 14:19:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008115e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700008000a0fffffffffe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x4, 0x1004003, 0x0, 0xfffffffd}, 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x484800, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r10, 0xc018620c, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/93) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) exit(0x9) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174000424090a0200027400f801edf4d1d72da5e66c3513720000000000", 0x27}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f77657865632c6e6f636173652c00e5e5688edacdc96c57e22406c23be97c34576b61a3c1b1872b9cb0fdb2195e87ddcc5d55aec51cc4bb215c8cea6acfd151c59ace4c31e4"]) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f0000000280)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000040)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x80000005) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/protocols\x00') ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) [ 390.452383][T29952] __nla_validate_parse: 11 callbacks suppressed [ 390.452443][T29952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 390.487560][T29957] FAT-fs (loop1): bogus sectors per cluster 36 14:19:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008116e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000002000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 390.499500][T29957] FAT-fs (loop1): Can't find a valid FAT filesystem [ 390.513168][T29957] selinux_nlmsg_perm: 180 callbacks suppressed [ 390.513177][T29957] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=29957 comm=syz-executor.1 [ 390.525984][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 14:19:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00005, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 390.549010][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.569980][T29972] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 390.572030][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.593581][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.613387][T29972] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 390.613809][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.647183][T29957] FAT-fs (loop1): bogus sectors per cluster 36 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000003000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 390.669334][T29979] FAT-fs (loop3): bogus number of reserved sectors [ 390.676433][T29979] FAT-fs (loop3): Can't find a valid FAT filesystem [ 390.688303][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.701161][T29957] FAT-fs (loop1): Can't find a valid FAT filesystem 14:19:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000302008117e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000004000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 390.705689][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.713748][T29984] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 390.724066][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.744931][T29966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29966 comm=syz-executor.5 [ 390.804569][T29992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000005000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00006, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 390.916469][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x1000, &(0x7f0000000080)=ANY=[@ANYBLOB="73686f77657865632c646d61736b3d3030303030303030303030303030300f303030303050342c00"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x80000005) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_gettime(r3, &(0x7f00000000c0)) 14:19:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade02556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000006000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00007, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) pwrite64(r6, &(0x7f0000000100)="959a4a0cd6fb8a89dcd2d43d2299218f6af2454435181972253c5085d03dfb1d87d6f17cee8a", 0x26, 0x8) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade04556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) [ 391.305404][T30025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f00000001c0)=0xfffffffb, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) ioctl$KDFONTOP_COPY(r5, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0xd, 0x3, 0x200, &(0x7f0000000a40)}) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3c) ptrace$cont(0x18, r11, 0x0, 0x0) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r11, 0x0, 0x0) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3c) ptrace$cont(0x18, r12, 0x0, 0x0) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r12, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="95ba1d60a0f808af9c879f79609cc7f5ce185fd93ea63abcb693f7638cc9d9ab8b350ce8e01d4c805b914bb8591e8b394b55e5c656d03029f65e4757db2fdcadcc538d93ce3bcdab3fde6b6e34b560ba70e795e09ebec9a9d60d3b447b53305578d006587ca1466a199a34406b716b86106eec7eb5c2f089d06814c7cef659156dc4e414431c0223b21a48a3cab3a590fe95563891839175487c0a55441935a61dc6cd0576c116c6dc064e222bc320ff5c395f39c6859a07b9131747c2685ebd59c92eda2032b936", @ANYRESHEX=r11, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r1, @ANYRES64=r4], @ANYRESOCT], 0xf9) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000007000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00008, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x3, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="63686d770097713ea59fcdeb4ae407a2eb223470fba59c2cfc9ce7b98e91c0b7e4b5d8"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/53) sendfile(r1, r0, 0x0, 0x80000005) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 14:19:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade05556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000008000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) r10 = inotify_init() r11 = getpid() fcntl$lock(r10, 0x24, &(0x7f00000001c0)={0x0, 0x4, 0x6, 0x728d, r11}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 391.387216][T30044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000009000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 391.435110][T30055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 391.480437][T30050] FAT-fs (loop1): Unrecognized mount option "chmw" or missing value [ 391.505197][T30061] FAT-fs (loop3): bogus number of reserved sectors [ 391.511818][T30061] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade10556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 391.609491][T30073] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0xe79, 0x422000) r8 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x84000, 0x4) pwrite64(r8, &(0x7f0000000200)="be4622fd", 0x4, 0x3ff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r11, 0x54a2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000a000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 391.685095][T30050] FAT-fs (loop1): Unrecognized mount option "chmw" or missing value 14:19:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa50e6c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00009, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r10, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x20, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x10, r11}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r9, 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=""/123, 0x7b, r11}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r10, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) prctl$PR_SET_UNALIGN(0x6, 0x1) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) r14 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r14, 0x88, 0x1, &(0x7f0000000080), 0x4) fcntl$F_SET_FILE_RW_HINT(r14, 0x40e, &(0x7f00000003c0)=0x4) 14:19:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000b000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="73686f77f56eebb043f0a6bc6173652c000071eb08968a659a30c40e86e894752c0e8870832c0c657b78ddbbe3b8fc5d5175a1ee50b72d5f28d5cc18df1ebd57490efd05506e3479e0e3cf0528cf3e"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000c000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000d000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0000a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c0e4d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r9, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000e000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 392.198563][T30109] FAT-fs (loop1): Unrecognized mount option "showõnë°Cð¦¼ase" or missing value 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000010000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000011000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000012000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 392.371606][T30109] FAT-fs (loop1): Unrecognized mount option "showõnë°Cð¦¼ase" or missing value [ 392.371787][T30153] FAT-fs (loop3): bogus number of reserved sectors [ 392.388509][T30153] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000014000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/12) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) fstatfs(r1, &(0x7f0000000200)=""/217) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r0, 0x0, 0x80000005) 14:19:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r4, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000), 0x10, r5}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r5}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r9, 0x0, 0x8a, 0x53, &(0x7f0000001100)="961023c16e64bf78de22fa0857094f8b039611f03859057d60cfbfacc088ea7d2200d62d9661453d76d77ddffefcc48d07a6841a82686c4c2df199d3eac47eb32302aa3883582bcb98ab1b37cf55a076b7568ea82f75133b1b384ea8f5406543e6bbbc841241cb3f25e3d6fdb0195c053f25812760bebf677760d6d59b257c92473485e6e79b9bccf05e", &(0x7f00000011c0)=""/83, 0x800, 0x0, 0xc5, 0xd3, &(0x7f0000001240)="fdc63965412063432b1e0dbc252373d8ab55218611220ea79f4573233877bb4e7ac7d93ed7625ee3131ed150e022bd85bb71f3fb9df58e89854c765a9b7a21551f7a50dae81a2999cfbea9b8e1bec5afef806d0bd5b7c0779287705c2e99d14db92774274610986b93f72d27034258b6c4e767827647205d115bc43e7083bb5fb4d30f41a9610d1890fb01b32bd684d0056bb71379e58e34399d4fd3dccfe92892d0172085c18b6925e3eaed09926bf82262156b930a7d962783f36eb8415e0e37610a070c", &(0x7f0000001340)="91968d883846a46b322b862693c0c39165225d67a3b7424b47a10339f24fd9cfc25279a9283b2602ea50293ae3050f18b4705db86b654660209bc5a20d4fe78ccaeccb0cb1670f8c82771972c8eb808410bf574b86832408efdf13893a07488168fd14b95330d5fb715fcb088ae10fb8d0ea6e7f84135ebe42cb750462378ada412c4aae723db5483623b810c44a9c02fc81f8695a69b7e050eedd6ab6d51115d6a1cdebd930feb9d50e39a04caf8492b4707bf70e30cffc96c99db5bbb4ee1a99fc28a5d9ef6d8dcd581b7ace83b367789c75"}, 0x40) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt(r11, 0x6, 0x1b, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r6, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r14, 0x6, 0x1, &(0x7f00000010c0)=@ccm_128={{0x304}, "ebcce09b7eead26e", "8cd952595f0c7a16faa4c5c27be49e09", "c5f36b7a", "b709143ebe9cee44"}, 0x28) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0000b, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000025000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x2, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0000c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/660], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r8, 0x4) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x28800, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x2f8, 0x0, 0x1c8, 0x1c8, 0x110, 0x110, 0x260, 0x260, 0x260, 0x260, 0x260, 0x4, &(0x7f0000000240), {[{{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x23, 0xffffff00, 0x0, 'gre0\x00', 'vcan0\x00', {0xff}, {}, 0x2f, 0x5, 0x1c}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0xaa5, 0x8, 0x1}}, @common=@unspec=@limit={{0x48, 'limit\x00'}, {0x9, 0x7, 0x3, 0x3f, 0xd5, 0x8, 0xfffffffffffffc00}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1d}, @remote, 0xff000000, 0xff, 'veth0_vlan\x00', 'bond_slave_1\x00', {0xff}, {}, 0x2, 0x2, 0x1}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x358) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfd53) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) splice(r10, 0x0, 0xffffffffffffffff, 0x0, 0x1000000400003, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000001c0)={0x2, 0x1, 0x3000}, 0x4) 14:19:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000048000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x4, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 393.059578][T30188] FAT-fs (loop1): Unrecognized mount option "shÇowe" or missing value [ 393.156267][T30188] FAT-fs (loop1): Unrecognized mount option "shÇowe" or missing value [ 393.188868][T30215] FAT-fs (loop3): bogus number of reserved sectors [ 393.195577][T30215] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x5, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0000d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:09 executing program 5: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5e) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$TUNSETPERSIST(r12, 0x400454cb, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700004c000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='net/tcp\x00') r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x7ff) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) accept4(r4, &(0x7f0000000200)=@ax25={{0x3, @null}, [@null, @remote, @netrom, @rose, @default, @default, @bcast, @bcast]}, &(0x7f0000000180)=0x80, 0x80800) 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000060000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0000e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x10, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000068000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x1a0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:09 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}], [{@subj_user={'subj_user', 0x3d, 'showexec'}}, {@euid_eq={'euid', 0x3d, r1}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@smackfshat={'smackfshat', 0x3d, 'mlo'}}, {@subj_user={'subj_user', 0x3d, 'wlan1security+'}}]}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r3, r2, 0x0, 0x80000005) [ 394.056044][T30272] FAT-fs (loop3): bogus number of reserved sectors [ 394.062868][T30272] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r4, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x1c) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700006c000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00010, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x500, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) connect(r2, &(0x7f0000000080)=@sco={0x1f, @fixed={[], 0x10}}, 0x80) 14:19:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00011, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000074000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x4000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700007a000000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000f1010000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000030000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00012, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 394.863918][T30335] FAT-fs (loop3): bogus number of reserved sectors [ 394.870598][T30335] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x7f00, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x3203004, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000003c0)="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") close(r2) r4 = socket(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x51, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/652], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) r11 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000640)="ae", 0x1, r11) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r11, &(0x7f0000000380)='asymmetric\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, r11) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x4010, r8, 0x10000000) r12 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="51e50234cd75d5fabdb07c734e52fd42c67f88c38621e2168e261c92fb69c555a44dea2af41701e6b380e1b38f25faed9afd23df4bdb3e36476f3411901397e261a4be002c9121af4e5affd878", 0x4d, r11) keyctl$assume_authority(0x10, r12) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000050000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 394.999268][ T22] audit: type=1400 audit(1581689950.677:70): avc: denied { map } for pid=30347 comm="syz-executor.5" path="socket:[91291]" dev="sockfs" ino=91291 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1 14:19:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000060000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00022, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x8000a0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_ULP(r11, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="73686f774678f6fa7bc137bbd7bc"]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000070000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x1000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 395.531302][T30383] __nla_validate_parse: 21 callbacks suppressed [ 395.531309][T30383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.549148][T30379] FAT-fs (loop1): Unrecognized mount option "showFxöú{Á7»×¼" or missing value 14:19:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x140, 0x140, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x7, 0x1}, {0x8}, {0x7, 0x1}, {0x7, 0x4}, {0xe}, {0xa, 0x2}, {0x2, 0x4}]}, @const={0x9}, @restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @volatile={0xb, 0x0, 0x0, 0x9, 0x2}, @struct={0xd, 0x6, 0x0, 0x4, 0x1, 0x3ff, [{0x6, 0x5}, {0x7, 0x1, 0x8}, {0xa, 0x0, 0x5}, {0x10, 0x0, 0x1}, {0x10, 0x4, 0xffffff3e}, {0x10, 0x1}]}, @struct={0xa, 0x7, 0x0, 0x4, 0x1, 0x8, [{0x0, 0x0, 0x7f}, {0x1, 0x5, 0xb0}, {0x8, 0x3, 0x5}, {0xd, 0x3, 0x400}, {0xe, 0x1, 0x2}, {0xc, 0x5, 0xf009}, {0x6, 0x2, 0x1}]}, @const={0x10, 0x0, 0x0, 0xa, 0x3}, @volatile={0xa, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x3f16770b39c9b2d, 0x2e, 0x5f, 0x5f]}}, &(0x7f0000000a40)=""/4096, 0x15e, 0x1000, 0x1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r10, @ANYBLOB="7df7000000000000000010000000ec3dc6957026ba43398662a68d250ac8d421b122b3fc9c3029369f0cdde47f244ffff58a28fc67cea0d078dc05"], 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r8, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0xb0, r10, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20004010}, 0x4000010) r11 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000680)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r16, &(0x7f0000001a40)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x54, r17, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000080}, 0xd5) r18 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r18, 0x8982, &(0x7f00000001c0)={0x2, 'bond_slave_0\x00', {0x9}, 0xdf}) 14:19:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000090000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 395.589426][T30394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.605041][T30379] selinux_nlmsg_perm: 229 callbacks suppressed [ 395.605050][T30379] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=12337 sclass=netlink_xfrm_socket pig=30379 comm=syz-executor.1 [ 395.621263][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 14:19:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00048, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 395.699969][T30403] FAT-fs (loop3): bogus number of reserved sectors [ 395.706691][T30403] FAT-fs (loop3): Can't find a valid FAT filesystem [ 395.724081][T30379] FAT-fs (loop1): Unrecognized mount option "showFxöú{Á7»×¼" or missing value [ 395.769741][T30413] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.772343][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 14:19:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x2000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000a0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 395.852307][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 [ 395.878108][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 14:19:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x2020081, &(0x7f0000000080)=ANY=[@ANYBLOB="509c65987f1f2d13e5564ba004bd4685d8420041c4b67544ebaf6d22fe81ad49a39eea7008dfef5c5f9c3007ad5b7e870d95a1b8e93f51d34488786ef7b791823d429e2f99b680e58fa2e5da0959250aef3193af50dcf4518dc20eac6c831b0168385ac36b9a5abe729474de449ec02ae0e59aab9260ce99d794f1faa4a9fd54484cb49f147c150132e7128a5c28b2033529e761a2da5f19ccdb77dbed974fcc4b052b3f20e3f5849bc2"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f0000000180)={0xa, 0x4, 0x4}) [ 395.893109][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 14:19:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000b0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 395.923236][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 [ 395.928162][T30428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.947685][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 [ 395.971358][T30397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30397 comm=syz-executor.5 [ 395.976956][T30430] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=30430 comm=syz-executor.1 14:19:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x4000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:11 executing program 5: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xa0, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:restorecond_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:newrole_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bridge0\x00'}]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/context\x00', 0x2, 0x0) close(r4) r5 = socket(0x10, 0x3, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r6, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r12, 0xc0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x6, 0x1}, 0x0, 0x0, &(0x7f0000000a40)={0x0, 0xd, 0xfb35, 0x6}, &(0x7f0000000a80)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=0xd8}}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) r13 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r13, 0x107, 0xc, 0x0, 0x4) ioctl$EXT4_IOC_MIGRATE(r8, 0x6609) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast2, @remote}, &(0x7f0000000240)=0xc) sendto$packet(r13, &(0x7f0000000300)="144b95f49aafacda6e13da7cd890f218ea41f809d0f004237bb3a46ea8d274534ca26d176039513a5576ce06182c5f3674a723b0b7e903625b4a5b71bb9d9747a1f4bac44abf47defa277e8f37b598911a93da5ef7aeea075af0fec42f18dde4d3cf6cf818d14cece4003de06e46de618fd12fc4b7a0753266ce9d76b440f9ff3bf8889ddadae6e5f529289f106597c37c9e74bd13fcb3caf3b0d4769eeba5bc11fbb9ab4aae41bf32ebd01687b47433ef6bc8c1320c0bd71dd826b2e7d6114253820a942f1bcc1f7c005bd9383f1ec11b379bf271e1724dff47559cbedb565167847f9757c02fdb7eeae887a496e942", 0xf0, 0x20048000, &(0x7f0000000280)={0x11, 0x1c, r14, 0x1, 0x3f, 0x6, @random="16067a233719"}, 0x14) splice(r2, 0x0, r4, 0x0, 0x400000, 0x0) r15 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKRESETZONE(r15, 0x40101283, &(0x7f00000001c0)={0x1000, 0xafc}) [ 396.017321][T30438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0004c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x5000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:12 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="73686f77f46c21072c6e6f636173652c00"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x208000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) sendfile(r1, r0, 0x0, 0x80000005) 14:19:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000100)='macvtap0\x00'}) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r12, 0x40045431, &(0x7f0000000200)=0x1) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00068, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 396.364324][T30470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 396.379900][T30474] FAT-fs (loop1): Unrecognized mount option "showôl!" or missing value 14:19:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000a80)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff0000000000000000fdffff3d4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800e90474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa20050000000000000000000000000000000000d5a605eb4bb3e27940fca8d429fc569f6aeefc1f248038949d7e68d7c4f48e15a055da8553be28ab1f432039cda09724e90a8c6f5fb969d1ae4dea45bb08d222249b3f52e9d40070a8f53362db16ab"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r11, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x118, r12, 0x1, 0x8001, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x541d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5dcd12b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe6c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xea60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x104d4883}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x75ab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4146bf0d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa87b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x34d6d322}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e70d6a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb8c6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bc0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x181dc29c}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r13 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$RTC_UIE_ON(r13, 0x7003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r15 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x420800, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r15, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010000}, 0x20000080) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20010, r16, 0x0) ftruncate(r16, 0x400) r17 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r17, 0x4000000000000, 0x12, &(0x7f0000000b00)=@raw={'raw\x00', 0x2, 0x3, 0x1e8, 0x128, 0x128, 0x128, 0x128, 0x128, 0x318, 0x318, 0x318, 0x318, 0x318, 0x3, 0x0, {[{{@ip={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r18 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r14}, 0xc) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r18, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfd53) 14:19:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000d0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x10000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000e0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 396.437307][T30485] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 396.466337][T30489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 396.493055][T30474] FAT-fs (loop1): Unrecognized mount option "showôl!" or missing value [ 396.500980][T30489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x40000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 396.581053][T30504] FAT-fs (loop3): bogus number of reserved sectors [ 396.587847][T30504] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000110000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x7f000000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0006a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:12 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x817008, &(0x7f0000000280)={[{@fat=@showexec='showexec'}, {@fat=@codepage={'codepage', 0x3d, '737'}}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, 'X\x00'}]}, 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x58, r5, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'showexec'}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000800}, 0x22000000) 14:19:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 14:19:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xa0008000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000120000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r9, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_LIMIT={0x8, 0x10a, 0x92c}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x5}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x6ed}, @NL80211_ATTR_WIPHY_ANTENNA_RX={0x8, 0x6a, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x2}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 397.248424][T30534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0006c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xa0010000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000140000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 397.422961][T30573] FAT-fs (loop3): bogus number of reserved sectors [ 397.429554][T30573] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000200000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KDSKBLED(r0, 0x4b65, 0x4) 14:19:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file1\x00', 0x20000800) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xfeffffff, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00074, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xfffffffe, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x300200}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x90, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1f}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x20048010) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r7, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r8, 0x100, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24008004}, 0x0) r9 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x20480, 0x0) r12 = syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x5c, r12, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r15}, {0x8, 0x1, r9}]}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r18}, {0x8, 0x1, r21}, {0x8, 0x1, r22}, {0x8, 0x1, r9}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x20044804) r23 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r23, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000250000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 398.123798][T30601] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value 14:19:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xffffffff, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000400000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00078, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 398.198923][T30601] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value [ 398.365967][T30639] FAT-fs (loop3): bogus number of reserved sectors [ 398.372732][T30639] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0007a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000480000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd02, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r4, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000300)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, [], r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r8, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r13, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(r16, &(0x7f0000000680)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r17, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0xb}}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) 14:19:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="73d8dbd3da"]) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0xa18082, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) dup(r2) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r0, r0, 0x0, 0x80000005) mkdir(&(0x7f0000000080)='./file0\x00', 0x81) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) recvmsg(r6, &(0x7f0000000440)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000640)=""/225, 0xe1}, {&(0x7f0000000740)=""/231, 0xe7}, {&(0x7f0000000340)=""/109, 0x6d}], 0x3, &(0x7f0000000400)=""/10, 0xa}, 0x10042) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000880)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, r8, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x408b0) setsockopt$IP_VS_SO_SET_TIMEOUT(r5, 0x0, 0x48a, &(0x7f00000000c0)={0xfff, 0x9, 0x4}, 0xc) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r9, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xf3) 14:19:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00204, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd03, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000004c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000600000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000680000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 399.019684][T30666] FAT-fs (loop1): Unrecognized mount option "sØÛÓÚ" or missing value 14:19:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) splice(r10, &(0x7f0000000100), r5, &(0x7f00000001c0)=0x97, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) lseek(r1, 0x6, 0x4) creat(&(0x7f0000000200)='./file0\x00', 0x128) [ 399.115410][T30666] FAT-fs (loop1): Unrecognized mount option "sØÛÓÚ" or missing value [ 399.145811][T30690] FAT-fs (loop3): bogus number of reserved sectors [ 399.152990][T30690] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd04, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000006c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc002fd, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:15 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x3, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x7a}, {&(0x7f0000000400)="38c66de4b19715c813a52a15cdfc84dacab54669259eacf2fa86f6491f6d8b21ed9538d336627ed084e08add7f106aac702a669c541dd48dd38de235479bdf04ea6575ed99914ad8e00fb40308bd5372e6cc069732cad521d40d18a26550e43319a6c4fa8dc9e79788cdbfa4758a2f0e96094e902462902e220e534eddbdea666e3718118cadb355030993f5ace583e76bf680b99673a14e806bbdf477b6383c5a207ab54d0d24b018509133d5b976998e720f701710b7b21234a0866b6c40e668e3b32631f7e8bffa75acea", 0xcc, 0x8}, {&(0x7f0000000200)="581cc320ab1a046819c4a24cad6ca48a70a159e280630317a51c170d58c017e107b4ba38438df9f810cf38eab626a181366fad6d80ba4b06cf75b672bd2f6f3e8f158c7e7f9ce438596490e526176205bf56f39ead7d6fcfabd0873a869a2451bec76dd6ece3f9fb12324b72a79efe95daad4d0eb323d167bbd869a9b3e2e9694aa0b114ea816f839488b6c5f5e435277ebe482179a5baec7427778cb2d06a83e8877aca2024135a33e94a590a22dc1325bd", 0xb2, 0x4}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d30303030068eadc596513035941414988426ab4320abffd6d84230303030303030303030304e5029cad906d67fcf3031324921264eac4aeb167cb33c03f108c0f835373736cde9d148bab93327f51ac2d68c38b90482a193130636ed1a4c4473e866d8084e162eee000000000000000000"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r10, 0x40247007, &(0x7f0000000300)={0x4, 0x7, 0x13, 0x11, 0x0, 0x8, 0x3, 0x7e, 0xffffffffffffffff}) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = socket$nl_generic(0x10, 0x3, 0x10) r16 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r15, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000280)={0x1c, r16, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x110}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r14, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r16, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x1}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x8010) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000740000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$GIO_FONT(r7, 0x4b60, &(0x7f0000000300)=""/161) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_MESH_CONFIG(r14, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r15, 0x2d, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x80008, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x8800) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r16, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = fcntl$dupfd(r18, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r19, 0xc008240a, &(0x7f00000003c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd05, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000007a0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 399.856208][T30724] FAT-fs (loop1): Unrecognized mount option "fmask=0000Ž­Å–Q05”˜„&«C «ÿÖØB00000000000NP)ÊÙÖÏ012I!&N¬Jë|³<ñÀø5776ÍéÑHº¹3'õÂÖŒ8¹‚¡“6íLDsèfØN.î" or missing value 14:19:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00300, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 399.990296][T30754] FAT-fs (loop3): bogus number of reserved sectors [ 399.997072][T30754] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000001f10000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 400.129574][T30724] FAT-fs (loop1): Unrecognized mount option "fmask=0000Ž­Å–Q05”˜„&«C «ÿÖØB00000000000NP)ÊÙÖÏ012I!&N¬Jë|³<ñÀø5776ÍéÑHº¹3'õÂÖŒ8¹‚¡“6íLDsèfØN.î" or missing value 14:19:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd06, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r10, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000280)={0x1c, r11, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x110}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r9, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r11, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x1, 0x7f}}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x3f}, @NL80211_ATTR_BSSID={0xa, 0xf5, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x8840}, 0xc005) r12 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r14, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000400300000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="73686f77657865632c716e6f636173652c00bde7220e17ddbe6b64fbf8d357c2478de7beb709caf47615a504d006b6092f31b3073218efde4dcb90d1e2cc9efa5dce8bc27046ced27151072a0c80604299b03d3c5027211d314d2f68f0b1c48ff08d6ab3f939ec9b2c4dfa164f4f993d2ef36ee6aa6083c3973556853f2c00df6787529e01408c94913c88e0"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f0000000200)=[r3, 0x0]) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) getresgid(&(0x7f0000000380)=0x0, &(0x7f0000000400), &(0x7f0000000440)) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x5}, [], {0x4, 0x3}, [{0x8, 0x1, r3}, {0x8, 0x3, r4}, {0x8, 0x1, 0xee01}, {0x8, 0x4, r5}, {0x8, 0x38d3b3423718fc5, r6}], {}, {0x20, 0x5}}, 0x4c, 0x1) sendfile(r1, r0, 0x0, 0x80000005) 14:19:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00402, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd07, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 400.673596][T30787] FAT-fs (loop1): Unrecognized mount option "qnocase" or missing value [ 400.688423][T30793] __nla_validate_parse: 13 callbacks suppressed [ 400.688429][T30793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 400.707868][T30792] selinux_nlmsg_perm: 251 callbacks suppressed [ 400.707875][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 400.735646][T30787] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=30787 comm=syz-executor.1 [ 400.758278][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 14:19:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000034000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 400.804782][T30787] FAT-fs (loop1): Unrecognized mount option "qnocase" or missing value [ 400.811229][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 400.841941][T30807] FAT-fs (loop3): bogus number of reserved sectors [ 400.848566][T30807] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd08, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 400.898815][T30812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=30812 comm=syz-executor.1 14:19:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00406, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000a0008000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x100809, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x88, 0x1, &(0x7f0000000080), 0x4) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000080)={0x2002}) [ 400.965577][T30815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 400.970673][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 400.989033][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 401.002899][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 401.023124][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 [ 401.026616][T30822] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd09, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 401.072309][T30792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30792 comm=syz-executor.5 14:19:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000001000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0b, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000002000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 401.152588][T30842] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 401.207516][T30851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2, &(0x7f0000000780)=ANY=[@ANYRESDEC=r4], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r11, 0x88, 0x1, &(0x7f0000000080), 0x4) fsetxattr$trusted_overlay_origin(r11, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00500, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0c, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000003000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r3, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x801}, 0x4000) sendfile(r1, r0, 0x0, 0x80000005) 14:19:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r9, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xffffffffffffffd6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0d, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 401.501331][T30868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00600, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000004000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0e, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = getpgid(0x0) sched_rr_get_interval(r4, &(0x7f0000000100)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 401.601924][T30892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 401.700419][T30906] FAT-fs (loop3): bogus number of reserved sectors [ 401.707122][T30906] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000005000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x80000005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$netlink_NETLINK_NO_ENOBUFS(r7, 0x10e, 0x5, &(0x7f0000000080)=0x2, 0x4) 14:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0f, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00604, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 402.340795][T30927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd10, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00700, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000006000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 402.469553][T30951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 402.536790][T30955] FAT-fs (loop3): bogus number of reserved sectors [ 402.543661][T30955] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000007000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00900, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 402.680931][T30972] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000080)=""/131, 0x83}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/78, 0x4e}, {&(0x7f0000000540)=""/254, 0xfe}, {&(0x7f0000000640)=""/234, 0xea}], 0x8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r0, 0x0, 0x80000005) 14:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd11, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000008000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x40000, 0x2) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r9, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r10}, 0xc) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r11, 0x88, 0x1, &(0x7f0000000080), 0x4) dup2(r5, r11) r12 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r12, 0xd9, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffe13) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r14 = accept$packet(r8, &(0x7f0000005880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000058c0)=0x14) r15 = gettid() tkill(r15, 0x3c) ptrace$cont(0x18, r15, 0x0, 0x0) ptrace$setregs(0xd, r15, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r15, 0x0, 0x0) ioctl$sock_FIOSETOWN(r14, 0x8901, &(0x7f0000005900)=r15) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r16, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x1, 0x0) 14:19:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd12, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000009000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a0b, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000a000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd13, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 403.360979][T31025] FAT-fs (loop3): bogus number of reserved sectors [ 403.367856][T31025] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000b000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x34, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000740)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)={0xb4, r10, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="bdcbbe437b65fd028ce0ad27b47ffce3"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc02}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x59}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc4}, 0x20000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r13, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r17, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)={0x2cc, r18, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_BEARER={0x194, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x28}, 0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @loopback, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x80000001, @rand_addr="5ffb4b52912e19b8e52f5478cc9c8d59", 0x7fff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x3a}, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7f, @empty, 0x5}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x11d53985}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x39}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x58}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xd11}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xf1cd}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3efa}]}]}, 0x2cc}}, 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r19 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r14}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r19, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd14, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a0c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f77657865632c6e6f636173652c00cf95a44fd71fcec86b10198b9b500dfcfad62c13797d67d0e9cb5c342a5b778982a352013e6d5285131800a05ca4dee44a030cedf6afca1eb72c411e4bf4755a7c8a9c0000943f0fccf81086e630a147066d0796e02c9a9d14fa4467d5e736e3b793b1271bf274e5c8fd4c52b3df9ff047ca8286de22279e271b9dc158edf34c8d16c8"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x1, 0xfffffffc, 0x9131, 0x4, 0x9, 0xfffffffd}) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) fcntl$setflags(r2, 0x2, 0x0) 14:19:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000c000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd15, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000d000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a0d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r9, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000000e000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 404.204496][T31081] FAT-fs (loop3): invalid media value (0x00) [ 404.210549][T31081] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f00000000c0)={0x8, 'bridge0\x00', {'ip6gre0\x00'}, 0xfff9}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) sendfile(r2, r0, 0x0, 0x80000005) 14:19:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd16, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000010000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a0e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6400102c04000000d9aa119d8aff6c0000f62d2a03302c3be405421a246402c3443736a34318a9e9be4c1dc869503175fa473f326996d598cc2d928093980dec26f75910fbafa5bea34bd11cb6f24f8b7ff9eddff457defca7ec0a44666237b1d9a435e3f08e67b71126a27e0b7515009a0288e06af2d12d233a95d8912540c6ffe65ccec275c78d389b94e6186f2ef0a8c579e33d69724ae2ce60710cb9a945db3ed92501c1dc86bd681b9df7e8d2e0e8cc58d4beb59962ce654f53fc9335c3f3aca4b1686f039542efe6e2f9f7b1927092cc399b27d47525423c43b46cb207cee21ef2038a98c5c5a125cb6909a75779de956e7b78e4fbc6096c875065dcb6ace1076ef324569e75bab100423f774f20bf61b396f6af21cb50346b0b7954dbf7e5202ed2b1a8da620f43c9b474bddcad26429f637a8d97372a7cefe1fc9a3e6a2dc40044b6667711c6fa11f8ec6cc7bbddbffbb5f0fa2590860668ba2fe7500a20293fad8db4cd31420015a4d7e224654655d8850d447cd8b2a536fcbebe3c0db0e4828a66aa918f767a25af633f980963d61d0ddb597e14843c33b8b8a5393488aa0515b4"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) fcntl$dupfd(r2, 0x406, r0) 14:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000011000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd17, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @multicast2}, 0x209, 0x0, 0x0, 0x0, 0xff80, &(0x7f0000000100)='ip6gre0\x00', 0x5, 0x5, 0x1}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a0f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="25396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000012000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f00000001c0)="24a000041a004c", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@nfs='nfs'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000014000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 404.869698][T31126] FAT-fs (loop1): Unrecognized mount option "d" or missing value 14:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000020000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 405.110703][T31166] FAT-fs (loop3): invalid media value (0x00) [ 405.116923][T31166] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00600, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r7, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r9, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffed4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000025000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430a68e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a10, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0e, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 405.727272][T31183] __nla_validate_parse: 12 callbacks suppressed [ 405.727279][T31183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d258cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000040000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 405.781550][T31191] selinux_nlmsg_perm: 174 callbacks suppressed [ 405.781562][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.799552][T31199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 405.802045][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 14:19:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000048000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 405.824574][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.837833][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.864259][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 14:19:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a11, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 405.907159][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.925618][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.940762][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 14:19:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffd0e, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 405.948559][T31212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 405.956251][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.980279][T31191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31191 comm=syz-executor.5 [ 405.997306][T31210] FAT-fs (loop3): bogus number of reserved sectors [ 406.004066][T31210] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0xa0010000, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78170c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000004c000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a12, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x3c) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r9, 0x0, 0x0) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r10, 0x0, 0x0) r11 = clone3(&(0x7f00000003c0)={0x400, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {}, &(0x7f0000000300)=""/190, 0xbe, &(0x7f0000000a40)=""/4096, &(0x7f0000000280)=[r9, 0x0, 0x0, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0x0], 0x7}, 0x50) capget(&(0x7f0000000440)={0x20071026, r11}, &(0x7f0000000480)={0x8c, 0xc9, 0x1000, 0x8000, 0x3, 0xbc53}) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r12, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x20440, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2502a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000060000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 406.589768][T31246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a13, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='net/tcp\x00') r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x7ff) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) accept4(r4, &(0x7f0000000200)=@ax25={{0x3, @null}, [@null, @remote, @netrom, @rose, @default, @default, @bcast, @bcast]}, &(0x7f0000000180)=0x80, 0x80800) [ 406.666013][T31258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2503a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x446002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x22) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r11, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 406.739099][T31266] FAT-fs (loop3): bogus number of reserved sectors [ 406.745897][T31266] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000068000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="73686f77f56eebb043f0a6bc6173652c000071eb08968a659a30c40e86e894752c0e8870832c0c657b78ddbbe3b8fc5d5175a1ee50b72d5f28d5cc18df1ebd57490efd05506e3479e0e3cf0528cf3e"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) 14:19:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x52, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000001c0)={'ip6erspan0\x00', {0x2, 0x4e21, @rand_addr=0x20}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2504a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 406.924787][T31284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.065664][T31299] FAT-fs (loop1): Unrecognized mount option "showõnë°Cð¦¼ase" or missing value 14:19:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000006c000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2505a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:23 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x3, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x2a}, {&(0x7f00000000c0)="b5490f1f86016e24330cf07257de5dfd4c24e549ba04f8eb3e551f0c294855fd8a151018fe6312579d5e8ef4b88dccb40ba64c4c402a12881d82918d626cf9ee5ce314942afa4fda399dafd418e45b844d0f78ea1964b33acfbe20cbf54ea3be88ca272b37d57289f3ce315c96af8c16cd", 0x71, 0x689b}, {&(0x7f0000000200)="9d29ed124f1351a6ceadaddc86d7c8e29eb2103f0149a3c3806b58b689b0128d9e22810637cfdc6192e9bbd679dbfccb6148c23f9025153df098af403683b41d4e2ffdb67d118450f376d406bcaa8582db61942cf85ab905f5970b931b", 0x5d, 0xd58}], 0x110000, &(0x7f0000000140)={[{@nodots='nodots'}, {@fat=@nocase='nocase'}]}) socket(0x27, 0xa, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) r3 = dup(r2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)={0xd0000004}) 14:19:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a15, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2506a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a16, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:23 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x3, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x2a}, {&(0x7f00000000c0)="b5490f1f86016e24330cf07257de5dfd4c24e549ba04f8eb3e551f0c294855fd8a151018fe6312579d5e8ef4b88dccb40ba64c4c402a12881d82918d626cf9ee5ce314942afa4fda399dafd418e45b844d0f78ea1964b33acfbe20cbf54ea3be88ca272b37d57289f3ce315c96af8c16cd", 0x71, 0x689b}, {&(0x7f0000000200)="9d29ed124f1351a6ceadaddc86d7c8e29eb2103f0149a3c3806b58b689b0128d9e22810637cfdc6192e9bbd679dbfccb6148c23f9025153df098af403683b41d4e2ffdb67d118450f376d406bcaa8582db61942cf85ab905f5970b931b", 0x5d, 0xd58}], 0x110000, &(0x7f0000000140)={[{@nodots='nodots'}, {@fat=@nocase='nocase'}]}) socket(0x27, 0xa, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) r3 = dup(r2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)={0xd0000004}) 14:19:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa200500"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x400000, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x88, 0x1, &(0x7f0000000080), 0x4) r8 = fcntl$dupfd(r7, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000074000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2507a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 407.460533][T31324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.505445][T31341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.655283][T31351] FAT-fs (loop3): bogus number of reserved sectors [ 407.662085][T31351] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2508a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000000007a000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a17, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:23 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x3, &(0x7f0000000280)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x2a}, {&(0x7f00000000c0)="b5490f1f86016e24330cf07257de5dfd4c24e549ba04f8eb3e551f0c294855fd8a151018fe6312579d5e8ef4b88dccb40ba64c4c402a12881d82918d626cf9ee5ce314942afa4fda399dafd418e45b844d0f78ea1964b33acfbe20cbf54ea3be88ca272b37d57289f3ce315c96af8c16cd", 0x71, 0x689b}, {&(0x7f0000000200)="9d29ed124f1351a6ceadaddc86d7c8e29eb2103f0149a3c3806b58b689b0128d9e22810637cfdc6192e9bbd679dbfccb6148c23f9025153df098af403683b41d4e2ffdb67d118450f376d406bcaa8582db61942cf85ab905f5970b931b", 0x5d, 0xd58}], 0x110000, &(0x7f0000000140)={[{@nodots='nodots'}, {@fat=@nocase='nocase'}]}) socket(0x27, 0xa, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r1, r0, 0x0, 0x80000005) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) r3 = dup(r2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)={0xd0000004}) 14:19:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/659], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x400000, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x88, 0x1, &(0x7f0000000080), 0x4) r8 = fcntl$dupfd(r7, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r9}, 0xc) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r10, 0x4) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f", 0x7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 14:19:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a18, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 408.242399][T31377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000c4eeff7f000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}, {@fat=@nocase='nocase'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, r3, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4048050) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r5, r4, 0x0, 0x80000005) 14:19:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2509a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:24 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)={[{@dots='dots'}, {@fat=@uid={'uid', 0x3d, r0}}]}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x80000005) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000d8eeff7f000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000ffffff80000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000ffffff9e000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000008000a0000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 408.321318][T31394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 408.431944][T31415] FAT-fs (loop1): bogus number of reserved sectors [ 408.465762][T31420] FAT-fs (loop3): bogus number of FAT structure [ 408.469438][T31415] FAT-fs (loop1): Can't find a valid FAT filesystem [ 408.479873][T31420] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700007fffeec4000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a19, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250ba16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20031, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x1197900f84f391e5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x48, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) statx(r0, &(0x7f0000000300)='./file0\x00', 0x100, 0x1, &(0x7f0000000440)) keyctl$setperm(0x5, r2, 0x202002) keyctl$chown(0x3, r2, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r2, 0x0, 0x2, r3) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000002c0)=0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x30c41, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000100)=0x4) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700007fffeed8000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2509a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00a1a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000ffffffea000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00b00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x40000, 0x3}, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @local}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="229865c7dfdfc0afeffd839b948ce1051127e4517416f1ce6e46e3a256e86fce0784fde1dfa1f685bac3288e085a9a86f660f967db48c52586f5377f86ca969b9260825ca33c548475c32ab3cf672684864a5c099460b5f6b4"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r3, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x80510000000000, 0xff0f, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @local}, &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x20000, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4b, 0x27}}) sendfile(r0, r6, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e2d, 0x0, @ipv4={[], [], @dev}, 0xffffffff}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x18) r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0) sendfile(r7, 0xffffffffffffffff, 0x0, 0x8400fffffffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="2878388d430b0000000308010200000000000000000a00048008000240000000070500036289c6fb50cd14295291b2584b8ee3a6278dc16a63a83f6e3607efb08f7c7186dcd52d113a99b5a0a7899228f8e369e04f46cf2e1311c0df60627c709b36a2e91dad1466"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000140)={0x5, 0x8, {0x55, 0x18, 0x8000, {0x40, 0x49c}, {0x5, 0x3}, @rumble={0x3, 0x1}}, {0x0, 0xff6, 0x0, {0x6, 0x800}, {0x4, 0x7}, @ramp={0xfffc, 0x0, {0x7, 0x2, 0x9, 0x200}}}}) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000ffffffef000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250ca16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:24 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') chdir(&(0x7f00000000c0)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x100000000000000, 0x400}) 14:19:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000fffffff0000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 409.303884][T31491] FAT-fs (loop3): bogus number of FAT structure [ 409.310280][T31491] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000001f1000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 409.405563][T31500] overlayfs: filesystem on './file0' not supported as upperdir 14:19:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00b0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250da16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401", 0xf}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:25 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000e66500004000ffff89ae5f32572701e9d9a74b84a9e48120fda8000000000000000000a3d1489e", 0x40, 0x1c0}]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x88, 0x1, &(0x7f0000000080), 0x4) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x4, 0x1, 0x801, 0x0, 0x0, {0x1, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000090}, 0x40001) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r2, 0x1, 0x2c, &(0x7f0000000200)=0x3, 0x4) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$BLKTRACESTART(r8, 0x1274, 0x0) 14:19:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250ea16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:25 executing program 1: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@empty, @in=@initdev}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000380)='./file1\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffffffffffe54}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) getegid() r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) fstat(r10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r13, 0x88, 0x1, &(0x7f0000000080), 0x4) fstat(r13, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = gettid() ptrace$setopts(0x4206, r15, 0x0, 0x0) tkill(r15, 0x3c) ptrace$cont(0x18, r15, 0x0, 0x0) ptrace$setregs(0xd, r15, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r15, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010003000000000002000000", @ANYRES32=r3, @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="f343d98807600bf6b45039a631194aae616cf8f8257975cebdb80c7fe146cff17dc80d112d8446c502bb78e3f78a5cb169d067decf819126cb89d36af8a8de5ff7b3f36ae80db1431ff399b7c2c1abfc954a77fd7e776d3e6cf5ca37fcc41d60ef691f73bde2619ba2bb7de985f4a86691087f7841c5042e51f9aa6fa83a5352b3cf7370118700b8c1dbdbbe49ad717fbb589ea344c6d4bb295bd062bd0d5cb8aa2883587dca2d2f"], @ANYRES32=r5, @ANYBLOB="020041af0407231ce3ee2e43bda91d62db97466e5825199c04eeb3340969a3c46bac835849813025777f339e4158afecb8342a008370170423e489d20e0c066c93953a5f8c503df86b012594d0887afed7829084e4323b8c3b67b5cff69bbbe2c3a06c6bed0eec9b931a7d1e99d1f33f74472dd4adae35764ea133f88267ea9299ef6c6b122898f9000000000000000912e9fc154b103b8dd6c60fa6b81f985f477118445036f501099b19cb99107c3b5cb9fe6286cc9feb40cf67ea0182d98494e205d5cba99d80f5293be3", @ANYRES32=r7, @ANYBLOB="02000000", @ANYRES32=r9, @ANYBLOB="040005000000000008000700", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64], @ANYBLOB="08000300", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="0a0400006302cb15d9f67c498abf0166bc1f810a5d5440289a847e83f4fdf5a9f49c2f61cf39dd8b8467de606bc9d505701ff4d2eca8c388543200e6326ad8f01ec0bc44dba481c63a0a2abdfaecd070c7f7a37158181a79013f01ee65cd815d831c38f86d00f0003d9c126494315219f2f5d90060d97c03", @ANYRES32=r14, @ANYBLOB="10000900000000002000020000000000"], 0x11, 0x2) fchdir(r1) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xa}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) r17 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r17, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff1200}], 0x1, 0xffff) ioctl$FS_IOC_RESVSP(r16, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80008000}) 14:19:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000fffffffe000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x40000, 0x3}, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @local}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="229865c7dfdfc0afeffd839b948ce1051127e4517416f1ce6e46e3a256e86fce0784fde1dfa1f685bac3288e085a9a86f660f967db48c52586f5377f86ca969b9260825ca33c548475c32ab3cf672684864a5c099460b5f6b4"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r3, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x80510000000000, 0xff0f, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @local}, &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x20000, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4b, 0x27}}) sendfile(r0, r6, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e2d, 0x0, @ipv4={[], [], @dev}, 0xffffffff}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x18) r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0) sendfile(r7, 0xffffffffffffffff, 0x0, 0x8400fffffffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="2878388d430b0000000308010200000000000000000a00048008000240000000070500036289c6fb50cd14295291b2584b8ee3a6278dc16a63a83f6e3607efb08f7c7186dcd52d113a99b5a0a7899228f8e369e04f46cf2e1311c0df60627c709b36a2e91dad1466"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000140)={0x5, 0x8, {0x55, 0x18, 0x8000, {0x40, 0x49c}, {0x5, 0x3}, @rumble={0x3, 0x1}}, {0x0, 0xff6, 0x0, {0x6, 0x800}, {0x4, 0x7}, @ramp={0xfffc, 0x0, {0x7, 0x2, 0x9, 0x200}}}}) [ 410.210803][T31543] FAT-fs (loop3): bogus number of FAT structure [ 410.217191][T31543] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00c00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250fa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700007fffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000080ffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700009effffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00c0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00d00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000eaffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2510a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x40000, 0x3}, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @local}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="229865c7dfdfc0afeffd839b948ce1051127e4517416f1ce6e46e3a256e86fce0784fde1dfa1f685bac3288e085a9a86f660f967db48c52586f5377f86ca969b9260825ca33c548475c32ab3cf672684864a5c099460b5f6b4"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r3, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x80510000000000, 0xff0f, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @local}, &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x20000, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4b, 0x27}}) sendfile(r0, r6, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e2d, 0x0, @ipv4={[], [], @dev}, 0xffffffff}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x18) r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0) sendfile(r7, 0xffffffffffffffff, 0x0, 0x8400fffffffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="2878388d430b0000000308010200000000000000000a00048008000240000000070500036289c6fb50cd14295291b2584b8ee3a6278dc16a63a83f6e3607efb08f7c7186dcd52d113a99b5a0a7899228f8e369e04f46cf2e1311c0df60627c709b36a2e91dad1466"], 0x1}, 0x1, 0x0, 0x0, 0x44000}, 0x44) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000140)={0x5, 0x8, {0x55, 0x18, 0x8000, {0x40, 0x49c}, {0x5, 0x3}, @rumble={0x3, 0x1}}, {0x0, 0xff6, 0x0, {0x6, 0x800}, {0x4, 0x7}, @ramp={0xfffc, 0x0, {0x7, 0x2, 0x9, 0x200}}}}) [ 410.888235][T31600] __nla_validate_parse: 14 callbacks suppressed [ 410.888242][T31600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00d0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2511a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000efffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 411.054665][T31613] FAT-fs (loop3): bogus number of FAT structure [ 411.061020][T31613] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e20, 0x9, @mcast2, 0x7}, {0xa, 0x4e20, 0xfffffff9, @mcast1, 0x37}, 0x4, [0x8, 0xff, 0x8, 0x9, 0x9, 0x400, 0x101, 0xff]}, 0x5c) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4ff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r3}]}}}]}, 0x38}}, 0x0) [ 411.216098][T31620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 411.266027][T31624] device sit1 entered promiscuous mode 14:19:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000f0ffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00e00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2512a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 411.365702][T31632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2511a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000feffffff000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00e0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 411.713872][T31658] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:27 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:19:27 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f00000003c0)='./file0/file0\x00', 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x193) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x79af, 0x3, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x48, 0x0, &(0x7f0000000680)=[@register_looper, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000880)={@fda={0x66646185, 0x0, 0x0, 0x38}, @ptr={0x70742a85, 0x0, &(0x7f0000000b80)=""/4096, 0x1000, 0x0, 0x3}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000140)={0x0, 0x20, 0x48}}}], 0x0, 0x0, &(0x7f0000000500)}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) 14:19:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2513a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000020000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00f0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000f1000000000000950000170000000065fb15087b4127ecf8991e370e6e2e0d6d"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$peekuser(0x3, r0, 0x3) [ 411.848304][T31679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:27 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='l\x00werdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)={0x0, 0xfd14, 0x5}) [ 411.916161][T31692] FAT-fs (loop3): bogus number of FAT structure [ 411.922486][T31692] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000a3000000ac70fbc496bab6b60ecce7bea585825a5a326e9c3726988210068472714c07445a546d592f7e654cdda08edc43327ed09d7b528d27d0b88ab3428a184587b631da971b3330eb1502e37f321d1d65182c517e732c80a895f4cad7162ba1b2773eff4b2838e681072aaafc4b5d767b5934a5218f6416cb811b9c6425b232f564b4a98ea79f2d3736ebbdfc580bf649eb766c9fcc306ac64c5d4617ac6569032e4f82f627c4505efcf9389b3025febc17ec2435c9cd895468cdbbc68bee"], &(0x7f0000000100)=0xc7) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x4, 0x0, 0x2}}, 0xe8) r2 = dup(r1) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) getrlimit(0x8, &(0x7f0000000280)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @mcast1, 0x7ff}, 0x1c) [ 412.086792][T31705] overlayfs: unrecognized mount option "l" or missing value [ 412.100534][T31705] overlayfs: unrecognized mount option "l" or missing value 14:19:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000030000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2514a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100", 0x10}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x0, 0x300) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000001c0)) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x541a, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004c40)=[{{&(0x7f0000000580)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000001540)=""/18, 0x12}, {0x0}, {&(0x7f0000000540)=""/25, 0x19}, {&(0x7f0000001680)=""/191, 0xbf}, {&(0x7f0000001800)=""/81, 0x51}], 0x6, &(0x7f0000001900)=""/11, 0xb}, 0x101}, {{&(0x7f0000001940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000004ec0)=""/4097, 0x1001}], 0x1, &(0x7f0000002a00)=""/123, 0x7b}, 0xfffffffd}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002a80)=""/93, 0x5d}, {&(0x7f0000002b00)=""/230, 0xe6}], 0x2, &(0x7f0000002c40)=""/255, 0xff}}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002dc0)=""/239, 0xef}], 0x1}, 0x7}, {{&(0x7f00000037c0)=@tipc=@name, 0x80, &(0x7f0000004b00)=[{&(0x7f0000003900)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000004b80)=""/187, 0xbb}}], 0x5, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000010000000000000000000000000000000796d70249701113786926d9a338bb445569b3465f3b334828b58ec15e834c481ed", @ANYBLOB="0801000000000000f7ae48ce1e010000"], 0x2}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="2800000010005fba27bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="030100000080000008001b00000000000229d449cd05eb8d7f30d821eecfd3b53f44c2700acb51a31152b58446977e586b3f9163b75944d034e01eada31382e89f4c3fc93870dbbbf7eca8a4c1e52e52c010c656bbc0618461402dc39c8d28e6e14171de9027c820913144318fbcd01292bbbc0630a4693fb1f33b16a4b590345380e882e880c05843dd0d9cebd703a05c8359465b4e9b6de57c0fab06151059dd70922b9d84190f00000000000004000000000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 14:19:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0100a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) setgroups(0x2, &(0x7f0000000340)=[r2, r3]) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r4}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r4}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 14:19:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2515a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 412.580284][T31722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 412.604793][T31725] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:19:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01020, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000040000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 412.631060][T31725] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 412.644472][T31725] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 412.652189][T31725] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 412.763161][T31748] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 412.771117][T31748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:19:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2516a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) setgroups(0x2, &(0x7f0000000340)=[r2, r3]) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r4}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r4}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) [ 412.808189][T31741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 412.812729][T31749] FAT-fs (loop3): bogus number of FAT structure [ 412.824017][T31749] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01100, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000050000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 412.889939][T31767] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 412.897956][T31767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 412.909089][T31769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 412.909994][T31767] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:19:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0110a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 412.935670][T31767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:19:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var={0x3, 0x0, 0x0, 0xe, 0x2, 0x1}, @const={0x1, 0x0, 0x0, 0xa, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x30]}}, &(0x7f00000002c0)=""/184, 0x44, 0xb8, 0x1}, 0x20) lseek(r5, 0x80, 0x2) write$tun(r0, &(0x7f0000000140)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}, 0x32) [ 413.428910][T31734] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 413.437034][T31734] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 413.448875][T31786] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 413.456782][T31786] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 413.465180][T31786] device sit1 left promiscuous mode 14:19:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x320c) socket$packet(0x11, 0x3, 0x300) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) socket(0x0, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="00006665a4adc4acef2280cb98307b3a381f00458392cf341e278204f68f8b3a036ea4ef5c5bf53b3bc533f50457", @ANYRES16, @ANYBLOB], 0x3}}, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="000000ab92fa0000f9ff00004b37d9b3738c6f9ad2c445d415", @ANYRES32=0x0, @ANYBLOB="14002b80080003000800000008000100", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) fchdir(r3) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 14:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b2517a16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000060000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01200, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) [ 413.474204][T31786] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 14:19:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000070000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761825aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0120a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 413.523062][T31792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7020b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 413.583018][T31804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) creat(0x0, 0x0) socket(0xb, 0x0, 0xfe) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) fchdir(r0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) bind(0xffffffffffffffff, 0x0, 0x0) [ 413.669023][T31810] FAT-fs (loop3): invalid media value (0x00) [ 413.675335][T31810] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000080000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 413.954880][T31795] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 413.964173][T31795] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:19:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000090000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0130a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7060b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:29 executing program 1: epoll_create1(0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./bus\x00', 0x6, 0x1) r3 = socket$inet6(0xa, 0x4, 0x20) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x41, 0x0) write$binfmt_aout(r5, &(0x7f00000000c0)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$UI_SET_LEDBIT(r8, 0x40045569, 0xb) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000001140)={0x1e00, 0x0, 0x0, 0x0, 0x0, "c45c2a42e3f0c32bfa69d748dcf894acdf1e45"}) 14:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x70) 14:19:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x29e4, 0x4080c0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e22, @multicast2}}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xfffd, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 14:19:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000a0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x20000428) 14:19:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0140a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x202581, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000440)=""/4096) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000b0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01416, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff, 0x15}, 0x8, 0x10, &(0x7f0000000000)={0x3, 0xa}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) sched_rr_get_interval(r2, &(0x7f00000000c0)) prctl$PR_SET_UNALIGN(0x6, 0x2) [ 414.547541][T31878] FAT-fs (loop3): invalid media value (0x00) [ 414.553868][T31878] FAT-fs (loop3): Can't find a valid FAT filesystem [ 416.059823][T31900] cgroup1: Unknown subsys name 'perf_event' [ 416.066108][T31900] cgroup1: Unknown subsys name 'net_cls' 14:19:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340)="3bf7e1abfbcff17665ffceb313dae9453ca7d1d526e27c182497b84ad96cc53b6d20a6ab70168987557716518feb6e317f5f7d2356ed3db45006577e32f78bb5c39975c6bc5d0e30b6bdb97de9e1220a2b2fa80eef04b03c00f8bc529b5c7ac422a120f29495adc666f3ce484a4b06c1c7b567cdc48c6650ee871512de7f67083e73ad80306b89124eeaaf37712c017b5f704f0cc8502afed067de0b5cd208fd1c5ff15fdb475583da5b399a05cbcff486494014e1c6b6513a1b563940464e7a0dcf45c32f596ac4e2f8b8f92ddebabb154a39bf3ac03f3fbe82f42af3e404aae03b42178690edca8a0af2d50c471b2227e8", 0xf7) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000240)='./file0\x00', 0x880, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) setsockopt$packet_tx_ring(r6, 0x107, 0xc, 0x0, 0x4) r7 = accept4$packet(r6, 0x0, &(0x7f0000000440), 0x80000) sendmmsg(r7, &(0x7f0000000d80)=[{{&(0x7f0000000480)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000500), 0x0, &(0x7f00000006c0)=[{0x38, 0x10a, 0x8, "a7eaae8721554f51124e698372b118e41d8cd98ed0d19ff6afc81ae1aef439b09b23"}, {0x60, 0x101, 0x7, "055e18415fe823cd1f1b47255deb8018cafb6bdba3ff2820bcd7e0788f184ddeaecce1b019021f57b1fecfd874edd116042cc491c9bc925c5b7882e0e9051b54b1094b8835652069782608"}, {0xf8, 0x117, 0x7, "bd3868d6c9b1cc72f1cfbdb1c05ca9a049ecc8d4cb72c24e363f08ea7111b7ba4be6120f7ad61da18ac1074fa2fb3cc964d1f3f44616ee2c569fdae8de1ce575ca6173749e2a0fc577c40acccb1e30e7150e9612639a544cf4747a36da8cbd47b8e6c735f22d233bd780cd98286474a8bb861171c91be1ddc8fe91d48e6885a63b464ba2e471b31a50ab0f63a33b23bde9263f367f043bd2d3f7145d0c44f03f97c590fcca42d5b11c97e6ef2712070b8533adbc217b0e82868d8b70d6d8d585cd9dd3a15cdaf7908c9f3c48bbcb363bc245f9ace84ab6ee05f6706a9579ce9c061e9be505063212"}], 0x190}}, {{&(0x7f0000000580)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000600)="f65ebc716d19e7d3f842b22d310ed8440eb6a7a9ca90e93587412bb1ed7d45f931a7cc90d38364e348aa32a9c2d8522214d94b8627613000a46337a67d", 0x3d}, {&(0x7f0000000880)="6e656833194613fce96595a81fc35a2302505ee16bbc6b8fbcbab62f44b522097401b6bc4a802b1629012ba3c44515b3b3c0d6172b2feec529f176a03dd446abb1fd15f53b75725f5fd1abcedce9d63dd34edd792aac48dc1193b02403b778e45b9d75aec56a775bf035a0a83b95dbbab8117670be8b378d80fbb2fa0488137fb76ab41d14f5ff766c7f7c74dc9a053dd75b3527b8d1d6479c45f3c75439fd3146dafb45fad7df469bb8dd7321e949674ffc3a5d0557", 0xb6}, {&(0x7f0000000640)="837a975a7595ee6c85fbb5fa2c34e5de7206062c09535734cd2dada26464ec321083", 0x22}, {&(0x7f0000000940)="dcf85f56db05944aa8b431f21dcfb0169e01d0111f5ba9206112af2a5b4cace1300321e4b1c074f878352d68f400620f919e2ff1455138359bc40634eecb0d402cd3490ba43ea3726c8af382d49fed7d1ef9d225", 0x54}], 0x4, &(0x7f0000000a00)=[{0xb8, 0x11, 0x5, "31ec23e65625871ab67ffc7cc1015a0d7432adddcb83e93d09d0ca8630ba2e7826ef652aed8385ac3b258a7544270f6587be492bed1d5265c26432056e670db8fab2ea504971e58df0f594c3979fd1f3243063ab7606f23c12f0b762aad504ca99029a84a016b78e1695a5e643e9d7dc9b5d472880e654370c30fc6be6756774b92e200692b9af5aadd19213240cf179128c60b60f79afdcaf3330efd5c30ae608dfb3277d553a4e"}, {0xa8, 0x104, 0x7, "f5104aea1bc80d609f91cba829f8f752cb7c15092716c314abe3b18a99718ee16b4c88fdeb62b36b20099306b9621fdae6843b89f1b46ece8ca7f4cc1e34c21d33764fa09fb6a1ac12fd868708306ea53fd221c3caacaa867e6bdc3c6ee026662ed955bc8dbb33fd93f9662797032d378dd0df1be1caa8c63b5943ea715dbcdc116e9eef3a42f6bb50a09f4652b229ccd3"}, {0x40, 0x6, 0x7, "5fdeaef6cef896014686dac96567f422694a9fcf0e07a07ec4e36b67bf3893743d8629ce507b7fdf3d8b6553810d01"}, {0xa8, 0x114, 0x0, "5cc4f698678aece228617842419fbefc6dcc6ea3d10880a3886556ac919d8d6bafd795800a778c1ab6d23a42dde46d5850804843717a22aa4d714b42db5d5f472578cd65e907b44f22c0536de7b9e99a05dc10f04990c224919f9e9735c381552a990518d00d3ba48acb7874b6dee49265f648b97741d9e7eaede4d8bb344761bffa5fc20d25adb0e254dd4fd542f40574"}, {0x58, 0x3a, 0x10001, "02dff3699857009b1562116d64601aeac01f6d1a33c64cc5bf114b39fa0b41c4bc63ef11f92c7626f11ea0dad9bd7c053219b9fc292c2f6908109a19b54fbb89603d5ac5e129"}, {0x18, 0x101, 0xfffffff9, "ed"}, {0x80, 0x102, 0x80000000, "0265e9c78addf65128e6de123e615d261f33f61f29299ed5f2fa9b221363928a11a3895dc2036669a75196ad96ba5707a380a7c2c74ce2b54d90e44fd4d5c67efb25e66715ee2ab464f986e9cf926a5c43b37e31a8cad1d07c1bc3dcee7374797398f5b3aea3046d9d"}, {0x48, 0x116, 0x49, "07a5d0468a93ab2c9b34331ee0d1887c3f69b0d611427fdae8061f6329cd5bff54d9cdd6a8d9a7a8cceb4c1b1b389fcc86b03e32b6"}], 0x380}}], 0x2, 0x10) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r8 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffa) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000010a000000eeffffffff0400000508000240524c60bf"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20040006) creat(&(0x7f0000000100)='./bus\x00', 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r9, 0x0) getpid() syz_open_procfs(0x0, 0x0) 14:19:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000d0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x800, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000580)={'wg1\x00', 0x0}) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r10, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r13, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f00000005c0)={'vxcan0\x00', r13}) sendmsg$NL80211_CMD_GET_INTERFACE(r5, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, r6, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x3}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000280)={0x9, 0x2, 0x3}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6}, 0x10, 0x0, r1}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r18, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x74, r19, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x1c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY={0x14, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_MODE={0x5}]}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x5}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x5}]}, 0x74}, 0x1, 0x0, 0x0, 0x40000}, 0x8c1) setsockopt$CAN_RAW_JOIN_FILTERS(r18, 0x65, 0x6, &(0x7f0000000140), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r15, 0x0, 0x75, 0x0, &(0x7f00000000c0)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:19:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x29e4, 0x4080c0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e22, @multicast2}}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xfffd, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 14:19:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01418, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000e0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0141a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 417.968222][T32328] __nla_validate_parse: 6 callbacks suppressed [ 417.968228][T32328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000100000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 418.017745][T32350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 418.072531][T32354] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 418.110436][T32361] FAT-fs (loop3): invalid media value (0x00) [ 418.116501][T32361] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa3000000000000450300f0ff00000000b7060000ffff39a046e08fe5ffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27a0e1773f04a22ba8cedf8510e63fb112cf6956e09d195401"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000380)) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000003c0)={'geneve1\x00', 0x20}) 14:19:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000110000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0141c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 418.335212][T32386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000120000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00* '], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 14:19:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0141e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000194bf8618c5d589116311100000000400cbd9ec8b9bd910c2000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x3, 0xf, 0x1, 0x54, 0x76, 0xfffffe00, &(0x7f0000000100)="c9f30a0b4944943aedbf48508c81a4f65f4eccee0532a9b4788b8853c00072882aa21a583ca7e082db7e96977b9907df115e3cd5149e87117c21cd35d1a891f10cf994d0977e53c329f789d2f2f166bc9d5ad6cb87ec0f8100e057f3d3bab2a05054a6bb878a39e823f0012cee799e1a08944beda078"}) 14:19:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(0x0, 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_create(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x11, 0x802, 0x0) bind(r2, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0xfffffffffffff315) sendfile(r1, r3, 0x0, 0x200fff) r4 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty, 0x5}, 0x1c) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, 0x0, 0x8000fffffffe) 14:19:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) nanosleep(&(0x7f00000003c0), &(0x7f0000000440)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_pts(r5, 0x400080) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'os2.', 'GPL\x00'}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000380)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) lsetxattr$security_ima(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@v2={0x3, 0x3, 0x4, 0x1, 0x5a, "fa5e8d10153d807c6828487f771dde7b89ebdfd14eede4bae0b17e7d1640dcb184c065186624b88867c44c010e08843840e9d7135304ed43e8f090faa8cf3103b03151b1ad676ef62ffb9c4ede4d3d3503b795ae21e9fca58695"}, 0x63, 0x2) 14:19:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000140000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 418.906913][T32407] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01420, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000250000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 418.958197][T32415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 418.994789][T32431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 419.071171][T32435] FAT-fs (loop3): invalid media value (0x00) [ 419.077283][T32435] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='$\x00\x00\x00 \x00%', 0x7) close(r4) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x3, 0x0, [], [{0x9, 0x3e9, 0x71, 0x37, 0x8001, 0x4}, {0x80, 0x80, 0x401, 0x3, 0x6, 0x7ff}], [[], [], []]}) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[@ANYRES64=r3, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESDEC=r5, @ANYRES32=r7, @ANYBLOB="84c0fa81f9b5ff57279bfecfa5a0530d2ef99aefdcbf47fef925af335d9d07998a16e50f0dff531ee0d0f67b2a51da0830c121cd5cc4368f696897203514eefa4a440ae577a8885fd4ec8150a72b03fda565e228c3c63dc76f01b1e5a5a83dd0a3ca08852385359cd6ffc7f38d4a7822691864b20454361da49855b86886eac374a8c8b98d21f3aaf46554c2c5c1fd8cb120218e879b35928c091d5296d9b50c73a15fc32c66e4f370208c7c0cdce22db534afe6b5947e263ae0fcba8fe84fe2d64f61fbe2403366e73d5b229f2976342c8f642c6d1e8b79ba711793bbe64c", @ANYRESHEX=r8, @ANYRES16]], 0x10) socket$netlink(0x10, 0x3, 0x6) splice(r2, 0x0, r4, 0x0, 0x4ff60, 0x0) 14:19:34 executing program 5: unshare(0x40000000) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001840)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@dev, @dev, @empty, 0xfffffffc, 0x1}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags=0x3}) socketpair(0x9, 0x5, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000000c0)={0x32, @remote, 0x4e20, 0x4, 'lblcr\x00', 0x24, 0x8, 0x56}, 0x2c) 14:19:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63222314d1a0ccade00556e97d003cc008613f230d6841f3099e19fd903b2ffa5106c534091c7457b2d624157f069737d63ab32be2a651d7cee2970a9df488cae6702031c4dc13745d4c57253b2d61d64787c4de49fc5", 0x0, 0x6, 0x0, 0xb6, 0xf5, &(0x7f0000000380)="15396af9a72e96da8129ed1653da4c7f58430968e943a8e8429935cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb2b8ef4491e30bc4c6d6a116c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3", &(0x7f0000000280)="9f67c6add8b00b43b8ee43aae35187d5dff7a24e6c189a16e1082f864d9474129bb125d2983c0ccb09f59ef3bfa149cb5e63578797792ef82c8fbccd369cc4c87c8e66af9f9693647160483d00f0ffffffffffff81726159fe5b2e78da851fa6b551265d1167c553131a092e62870d4b7ebc6b3047c9f3f14aad6f3267adea6259af8133d88c32c9dfef8adea4422dfe013cbf0fc27515f2af35264b75db5a8127610208d26a3ddff6845578bb810c9b052a4ef65875dd9c4668da117372fd1691a9f34fbb7435269d255878ae748803e1d2f4672bc93705fa8688e3da2a4ef24763266788a7aaa2ba830d0f000000000000000000"}, 0x40) 14:19:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000480000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01422, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x0, 0x5, 0x7ff, 0x0, 0x400000000}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback, @loopback}, &(0x7f0000000180)=0xc) syz_open_procfs(0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0xa) fcntl$setstatus(r2, 0x4, 0x46000) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, &(0x7f0000000100), 0x8080fffffffe) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6, 0x12, 0xffffffffffffffff, 0x9a5a8000) [ 419.266805][T32455] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01424, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000004c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf33c4db0b99b3c73}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000000002c00000060d2eacf2e683c040000000000000001fde500000000e4492b000004000000000000fe8000ffffff880000000000000000bb0000000000ffffff88009241b0060001322000000000000000000060000000000000000000000000000000000000c9b35e3f62d8be000000b320739f07d36cd2f6958f4839213249a6131a5d18c57a008194099ddff6cdc581f5ac5b2013dc442ae40000000000000000c158f76978af028fd4690f1b9a42c346a92ee05e3a653fda1be913112e395f96c1b826765602486262766ed194c4f0fb7f2da72f4f971da3e535aa06c8f81bdc9004b10d15ea9db67209f77deb88a61c996859e2bb0d394edc3f237dfe5aafffcdfd1ff5cdf8a611da5b00f92e13c4a65cc0957822f2d8679129b7d2ecd6efa8918afaa46dfded5cb92f3f3877d7a7da2165c13a908264f36b8353039c8be586059292b5fa8e33e2cb6d91b5b82d63ca08"], 0xfdef) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:35 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyS3\x00', 0x2, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x2, 0x1, 0x16}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r6, 0x540a, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKIOMIN(r9, 0x1278, &(0x7f0000000240)) r10 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) dup2(0xffffffffffffffff, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xffffffffffffffcd, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xfffffffc, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2400005}}, 0x9) r12 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7}, 0x10, r11, r12}, 0x78) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 14:19:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(0x0, 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01426, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 419.772675][T32485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 419.784394][T32485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:19:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000600000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01428, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 419.819172][T32490] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) flock(r0, 0xc) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9, 0x47]) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000680000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 420.008386][T32502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 420.025198][T32505] FAT-fs (loop3): invalid media value (0x00) [ 420.031426][T32505] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0142a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01428, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000006c0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0142c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in=@empty, 0x4e20, 0x0, 0x4e22, 0x70, 0xa, 0xeeef052615702129, 0x20, 0x88, 0x0, 0xee00}, {0x81, 0x203, 0x1, 0x800, 0x5, 0x5, 0x51a9, 0xffffffffffff0000}, {0xa0, 0x4, 0xffa, 0x2}, 0x80000000, 0x0, 0x1, 0x0, 0x2, 0x1}, {{@in=@loopback, 0x5b88, 0x6c}, 0x2, @in=@broadcast, 0x0, 0x1, 0x1, 0x63, 0x9, 0x0, 0x9}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000740000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) clock_adjtime(0x0, &(0x7f0000000200)={0xb00, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x7}) r3 = open(0xffffffffffffffff, 0x182, 0x80) ioctl$LOOP_CLR_FD(r3, 0x4c01) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) fsetxattr$security_ima(r4, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "57e5738a55f246f3c819cfe175"}, 0xe, 0x0) 14:19:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0142e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:36 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x200000, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) ioctl$TUNSETOWNER(r2, 0x400454cc, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000006c0)=0xc) ptrace$cont(0x9, r8, 0xffffffffffbffffd, 0x4) r9 = eventfd2(0xff, 0x80000) fcntl$getownex(r9, 0x10, &(0x7f0000000700)) sendmsg$IPVS_CMD_SET_DEST(r7, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC, @ANYPTR, @ANYBLOB="000126bd7000fddbdf25060000000800060004000000080006000300000008000400ee0000fa1b00020508000300000000000800c8e761bb000008000600920400004000028008000600ff7f00000800030002000000060002004e210000060002004e240000080006000100000014000100ac1e000100"/130], 0x3}, 0x1, 0x0, 0x0, 0x440c0}, 0x41011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f00000000c0)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) fallocate(r10, 0x0, 0xffffffffffffffdb, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000003c0)=0x1) 14:19:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(0x0, 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000007a0000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:36 executing program 1: socket(0x0, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0xfe) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005f8781e54ab64c99830000000000", @ANYRES32=0x0, @ANYBLOB="0300000000000008001b0000000000"], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000f10100000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 420.691974][T32570] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000300000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 420.758025][T32570] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:19:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01430, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000500000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 420.850365][T32600] FAT-fs (loop3): invalid media value (0x00) [ 420.856458][T32600] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x44) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="7f39a0d162ec40"], 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) write$FUSE_LSEEK(r1, &(0x7f0000000580)={0x18, 0x0, 0x0, {0x800}}, 0x18) setxattr$trusted_overlay_upper(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f0000000880)={0x0, 0xfb, 0x1011, 0x3, 0x2, "f98a5756022343a5225dc1be4e011394", "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"}, 0x1011, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000002900)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/273], 0x154}}, 0x0) r4 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r4, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000600)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x0, 0x4, 0xd, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x20000}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) creat(&(0x7f00000004c0)='./file1\x00', 0x188) lsetxattr$security_ima(&(0x7f0000000540)='./bus/file0\x00', &(0x7f00000005c0)='security.ima\x00', &(0x7f00000018c0)=@v2={0x0, 0x3, 0x12, 0x1, 0x1000, "b1e4639936b056d0b278e1e3ebdaa418b5e86d596c01979b124d94d97c97aa5a5c42b3bb97344515ef5366dcdce2fe94f19acd4c68f1848471f47485096bc36f509bfbf97efcc26bbc464629319de0eac6bb031f0ae45838fb11b55679067206e8b178809e687bc4a0025af2527e3927f4dc29e3255b1fe79f590b13436bae30060ed0e2f3bbe93bf9953d6616df8fb9f3cbd4025ac7d9413fa5f0ee2cf760b0dbb4ba730520a9b32c2d4482f1165d6a6835b55e89e8851935130744b95d2185ce3f3979ada8eabf6f11c66f5294b4d5cf4fa17cde3c181e83697838cfa5de2a13e61d4b3f8ee1023884de6f6a5db47686c785b2e23b80f639a0df1875fcae3a34be3f8b176aa9dd6d81e0247be0cd033626358d173807b646a7f1e120f17c7960ea2b2118d99b44468e46aaace0106357ab4fc3fd5e089b5aee797cf75def6033e0b0d920e23a9ce5c9e753576c3e0cadf889b1dabb5ec87a4ae8dbac86b840cd5e2310770ff95c7ad3ea2ec09b1cac6890eddc93c18b57353350975a4845d04a0eaec8d1d49a1de39d70c5378c634fd66e18c7f925bd5478e0ac98410890f84684b054f2e22d3d2f3764932339200dc7e78cbf1648f2347d3d652b7a10f2b31ac1dcc2bcec9af7a5a53ff4d882172ac7b533354bb67456b302efdd49654dc042045d09f0d886214543200023c319c7a490a1bc33490117065f2b7bce9130499cae36ae3f6d32db010b4eadb9aebc9ad00e65992d17cf87d2e024fca0f1e506a4061522cdfecfa085852f84afcd9e6e6bbb7fb5d432f407881d4f8c28ae90ae2fb15bad4017cc8ec681ad16f51c5ceaa33bbb6fb5097d1bd7c424f9f2c5c4eff11191c061318c10415c2ed4b5519f6e283bb890120eaa0caa0fac67c66af679ef1b4b8511d8d67aaa9b0f2d7958dc366a175a16ba56590c1158227930fbfbb3ead16897c4bb917a9abf09dd3621f357b44aa3bb394b1a294fe58dde9a954008be40682b28910d9236d830b7aab438e68f44a5011ddcd33950b1b8836087b21e38979726f035f26eecf06906bcd91e418c1606b8d1ca19c6c735324df78374f57c5e03a6dcddfd2e454be21c922bfc997f510dc096c48668ef094f070adb338bd90a88134218d73e98994f779055c6b4554682f35ee61d530afebdfe2a8ef7b1558806bf44b5352d8b678cb9eadd251776b4633de9c10e062ea6992212a35691a9e2c6d3da5fe6ea9cb8e89fd9bfc8fa16269ea9f969e8d3b8323e4ec532caff59545dd06aad52f09bf0b95947d6cd4d253edf49e4197430682418078b68b910161bf17bf8f4f33fd6f9ac79e56f07a9ab7482425322840cc5839ab664ee61c1b5d75a1aca33a795fc39134e79b742a899ac1dfcecb3e843c6876f8b00ef8483f43d0c76d6b8f9b7d6c077f00fc3d6888c515f914bae896a4e9888aa0e4dd165c53c6af99bfe0849fe2bc9558718913cdc081e1aefce117b6caa765c2d84de175b5b14c9ad31bb2c0e2ffd288a2205fa400c3fd4cab76e8a41887699dcdd1508b9b35073cce50862972afee0c244559b41f7443a0846cc3c8cb7e25a4b1a27c1c5ad63a2ab1b9c0f117d5453d0cf3d269f0e7cf3eba9e7b9cac1b48990bec56d012b486ca8c80a6d58e7b7ed1c64a136bad80a31035fb5db0eea7de207d885fdfe80eb1f61b1a73bb2163a0d23e7535d4bd28aa784750fcb03faf29e3fa95ef8ba3d34e474df33c569f3575007035d8afd6d686d29753f52a4a9a1dab86f3031c4e4322ed5c22d93ded6b5e8e4dd25ef9b4f54c6cd30c50a0ff939a8eb0b77c15af4e8234cdd2824295776becb02a485af69f8a344b528572e8c0964ebc721507c453346abfc6148539c612010656b6e5b005c32a5816a0bddc7b25eb03d403e91d8332f09bc255b7baa8e3372fb1fa11ebf6b213de5abcf98c978f6643639d1fa459d2117057411876ed3748547b4a613d26df96631848b1961855f2e035b17312822bf0bc2e77f53193845de57731bb4831ea753c51c146b15e6e17b1315f6bfc1984fe7398c41429aa367c02deffcb261bed5e06fb7d6e14c384db07978fd3f12a564076b60ac83ec9acc5d08a4741f59e72d4e5cb3ebf8a7421d82d202b7df5a3ed21b7c65da435e02e8b086bc5670a32d164849f396b7f7dd40519eed3c0a8cca4dbbc06f9b04bc731f17f3b42336dc373c46d0e9eda7c30edaad2dc3595d0a84c2d6ec4b259042da831b2e70bafc9a4120f9944027d0c228621095e85fab687733ea9f3841cc55b7c22186c6cd8ff1697fde932774f304549c814360e4de89b90620452faafb621e000ff57216da195f8def2980e0bbfecb00f9645e1001279c1a2b225d92bb17890f8134fe9b2470fcec767a4d2807c9b21423f4602cce04f6ea8c5b27b33e6af6a825d0af57ed03fca095b47618f825f4ee82e7eeb5a9150369f17c7fc853369f091deea0180cbb06910eee242a6d37752a8b2375a59f68c68ff658ca0bd3af945e812408bd90ea8b4131d05773c4c1410ac13683bad65cc28ec7ef84a5acf2040028a5fb380e94344fc3cb8b7396f65ab2c976ec6f606bc1ac1c799653e1ff1415dd0bb8c0c7c577ad37163ff0cf311c93f34c5f349f2fc817e227271efd85ab0d3f358483afff2f4563b0aa483a06fda3cd984820c27814b65c06b850cc6ac3209e25c9104dd62dfdbc489c5d3605c60ac73046ef5b0d5f0b8a5171d37d1d1fdc6664d2ba105e59429b952d3b596d75394cc272907357a006a89cd5c8d296fd241042957fec3a2534d0382ac07cb7605adf5fa1a99d8b2513a50ac5fe86cc9a7a36368e0288170f6a9a7508982ad895ce0d7806d1402e7b1253f56e7744a67d5482fe3e2929be0f1955126c3621ba900f71971bc77f2839727bbd129a0e68290137b132361c9431a3fe7ec666f1e540b57aa0a23a4bb4f93bba23770f5f30c2b8ba6dea0bc948990f09cf658efa231c96e7e0c3981a059793299df0824ed11acd19afa2d0d7cc451060d6bddf16dac6fdab2c728e107a4dea05d24cae04ad25149682bc7efdf9b55b8746f46014da44714d627f261bd19804e9076e2da01088e23838eb42899d2d599fca784196a6802f714ec47e23889244e1d4d7fa90102f97c0128f0281ddd67e9acf11c9cc26327e6870267309a5404579ffe226229bb76f5051757bc2fc19153c25eb81fc51cd93de9446902924323a8cf807c3afb4e817020b142b423d1af28ca11e7641f7bba049e32b0d2e20a99c757cc6aaa01863b6e020ee09cb7bc8cf26f1d50bbf0357abe82566dc4c20fd221f7d47199c91ef5ea41bb9aef65145072adf4de547d55b4edb30138a748fd88f67d3db393d8f819dbbf09e5383a646c9638111b5448fdbdb039d6a792c9a5b0d00e57b6ad11bdbefa3a665812344c910b59145e2a55f5fef8a82f11ceabea6d1d51d99d55f28ef227c062346ec927fd01a28f73d5fbca47c2e986d8a7152b41081c6e976c742b3bf65f5d2747d52cdf5f58b1c11018eb3fd2f0933527b969333855220dd339046d1a43281744a36a3fd8e165d192be9a67fa09640d1892207a366aef9699f1c2e33f8b14f57ef8366ced0ba34613125ed35d9749c8782e344c38f626af00c3f1ccbe2de62184753547ad4a03c43620172421581ca8b95f08f6edaecef5cd75a7d8de27728eef45b8a9897281672f2315ffcd6abedfadc726399fd9957928bc42add4c1a5a3c4984a82da2d309fdf3ce9ef334d6b81e7cbd19c187761b1f1d6d90138c36d3870d5d3d598cc64c6d5012d0558f45e1b0351d8084332da0a5126817195d758ebb6583ceafa03aab93f87bbfd7033f9f3e4b8425a86d0bab460f7a8abd2cd1684457b76215e63fa5ff518e405fecd784e2eecb3dd3c8413a21bf26a34a7feb88304b30f11a7979b235b77801943423589c46e23b8d05fc43fe2ab4cbdeb78bd9ca6fb77ca66edff09010204b9f82bd2f72e081c848a2a7b5c57260bcae4869771d655961de93a02c37173fbe843c09526bbe8898ce7ab7c65fdf1970c2938bfd8d88ae06cc94c66eebaea5ee5c2229075213269617909febc626db496108ebd62f37f764f03a1b109989466473c07827885cf3201eaa687eaa1556857e1423df8399448c40b35c81db2374197938f31320a70b7f5dd7d4e0e8fe3f70757049f4d8017a24ab648112e77a6db6f34a7000024a3e1235827b73e9227a187ac7a29322e4924d89297fc0efd6eb568d5a974b94dfb3c563fa62a9771a2c7de3065158a726b7dbf3640e23df801f162ecd710872eff201c737124e115da69b7d9b576a452fc5b355b6fc3aa3bbce30fa7724164b1c24c8fe6d5755b7d2c3dfb0945431adc5ad77bdd4bfb9b653265eecb77bbbf2b4f88ce631b37d60c75e1162b6bd7e9ca2618527e4d8d0f14885981159d45d87b090526c7a8d2f0e08dcd9e60d7181f6d57af566d1c5011deb141022d6a47358127bbaf352a40c1cd8a511475223906fdbb16df5bee7ace0ab88989a00dfaf747429b3672da2b95935a101fbf061e2077c32a41785ed46d31a5d3b47205d43d14a65132244bb139eaca44b020da4ad4a87f36bb5098c7967b8c16e4d5180c00fdffe54d400459fdd5d67fee2c42e1e58f11c0d512a47cffa89eb810d29e7028ec4a73c0e2005b33647973973a45b2c6ef5bda1a101e3a6478d1d7e9ebd3a95b6c9556e206161434a1d458b5ccbdf696e027f39ae3d1257a6451222cb8819361f7802813fff0ee179ddf670ddd83fac0722a6120560e3e934d8c8f345860f59c47fddee8a2328d6faa61364509c329ecc3e2d36c04b6a1d3f2e537c5ca43ce461779ec3980e868a737ea7c2588c4ec1d8b2745a4e937fdc245c972a4d51a48f4ef77480e7ad84468bfa1c4a2b26fe6c37237af5472d9c8e68ff24fd2425f7b3f52d124934b771b36cae63bf4332f68d7ac8af554e3e54549de410180c7b342c0a3da711151e88368ebd3d408371300359546c3f07318221c25276e037d6d74fc564717ae4250b30cd39fa60f2561dc00408e952a08f33ed2ea4fd8a83e4a45e76ac08f2231d75cdc9c2a6984640515d7a4817df98a02151193573d3e6f316744922c7e23410e78972d2c2f5281de1c05dd753f6e64d23ee6198f3253d4ee1b19bf9246d4a18aef547db74468f9cf155888a3233a4875ecc91c8d60ddb75b37dbaf0062ba418a122f0030e0410b0d5e9a90fee5c9758c83dde99dc947ad4474076d03e5b8b0210dfa3836dfae10bcf4131b07d9b65bf7d768f10932da4ff83861dc775e770d45dab9645d80a0b95a6ee897023791bfab88e9e80be8696e8a54fa0f683a2a8f34b712d42f6586a300ba407bcaa9dd0fcca69e11655d8416220a5788207d36caaebdb56635372d198b8decbf7088900d16bde4a2b7541814f99ee0b691c0c975ba3d299d3f000982791eee56918bdfcaf96dc858a30f3e9c600613c789decdfdd3fffaf8134569715116f66662f190d7be0e1135d54cf1e10206f8504136116eb015935f9d167c9997a4fa6589ac56e2ebef68264591204c931a71edef8539406cba8e9d75433d9bbdf2280392ab568b67047680226da8d2ae7f461ac912e5ba639411ad409b96cb9804f631ce344bb6feb45b86b77b281f16494c00e9f07bf8e96781da274e4cad69d50c54afe3632dbf29cdae9c135ae477908662733bb87a2842b0c46421712e4aa7d011450d13627cf6fcdc56d44a90ebf5a9b7c3c924a55435563fd6181fe3fcf58c8f3784e01093853db7a617898c94bae0c"}, 0x1009, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000), 0x10, r7}, 0x78) 14:19:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x40400, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'wg0\x00', 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x29, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/332], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000380)=0x7b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$inet6(r7, 0x0, &(0x7f0000000440)) connect$inet6(r8, &(0x7f0000000480)={0xa, 0x4e20, 0x1, @loopback, 0x9}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r11, 0x10f, 0x84, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f00000003c0)=0x3) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000600000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01432, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000700000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000900000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r8 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r8, r9, 0x0, 0x8000fffffffa) 14:19:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01434, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:37 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x280001c, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7, 0x1, 0x0, 0x3, 0xfffffffc}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x9) write$binfmt_elf64(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="000ffff08073b9369ce73cb6bddb27ea6235115750e987940bb252dd444d"], 0x1e) sendfile(r5, r4, 0x0, 0xa198) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f00000003c0)=""/21, &(0x7f0000000680)=0x15) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000001000000"]) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x6, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001540)={r7, 0x0, &(0x7f0000001680)=""/156}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r7, &(0x7f0000000480)="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", &(0x7f0000000580)=""/225, 0x3d7517ab35325b1c}, 0x20) clone(0xf5162583, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x9) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) ioctl$ASHMEM_SET_NAME(r6, 0x41007701, &(0x7f00000000c0)='/dev/net/tun\x00') 14:19:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff0000000065805afaaac77053c3b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b820bb16d2a945423b083f2b9ac5b3bbbbed7e8c9a2a9489dfba9f96843ddf636c1367684"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3fb, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f00000000c0)=r1) ioctl$USBDEVFS_RESET(r1, 0x5514) 14:19:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000a00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) fstat(r3, &(0x7f00000000c0)) [ 421.672975][T32681] FAT-fs (loop3): invalid media value (0x00) [ 421.679094][T32681] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0150a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000b00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001020000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16972eb83ee5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x7) 14:19:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0160a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000c00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000d00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:38 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/87, 0x57) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7) clock_gettime(0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) ppoll(&(0x7f0000000140)=[{r2, 0x100}, {r0, 0x112}, {r1, 0x184}, {r3, 0x20}, {0xffffffffffffffff, 0x80}, {r4, 0x1022}], 0x6, &(0x7f0000000180)={0x77359400}, &(0x7f0000000340), 0x8) setitimer(0x0, &(0x7f0000000240)={{0x0, 0x2710}}, 0x0) syz_genetlink_get_family_id$ethtool(0x0) sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_ALM_READ(r7, 0x80247008, &(0x7f0000000000)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYBLOB="7c00000000f8447af1aee68385f79199e5e73b"], 0x2}}, 0x4000) r8 = getpid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x100}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]}}], 0x1, 0x0) unshare(0x40000000) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmsg$IPSET_CMD_ADD(r9, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="9400000009000000000c0000065c0007800500030004000000050003003f0000000c001b400000000000000008050007000600000008000940000095f3050003001f00000005001500080000000900120073797a310000000008000a400000000108000640000000020500010007000000050001000700000005000100070000000900020073797a3200000000"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x800) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000000), 0x0) 14:19:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r8 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r8, r9, 0x0, 0x8000fffffffa) 14:19:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01614, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="b29bd2c16a6ca0e842561149c2dcc373b3f1b1c3d0d1f93298f1556625fca3ffad503c37138101e23bfdf0e857596972ff3513d50def3cb273fc7f0446651621aa9aa32d38cd9f", 0x47}], 0x1}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x166) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000480000000000000095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13050000000000000026fb0b71d0e6adfefc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35806150ae0209e62f51ee988e6e0dc8ce974a22a550bdfd70800c86ae3b3e05df3ceb9fc464c2a100c788b277beee1cbf9b0a4def23d410f6296b32a8343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f597eba9ffab3e05379e5aeb0597a13b3e22278d00031e5388ee5c867ddd58211d4ececb0cd2b6d357b8580218ce740068725837074e468ee23fcf49822775985bf31b715f5888b2153052ccb1a78a8b2b8c6ef48a71221ce3c601db96fe1a90374b8f883a2db630e0af6e80187cbebd5bbd6208bc064baef219787e784c3b12011ae7cd2b75614b4e9373fcf51814d5d4d3527268f50ce374341e30bc2400f8d1ef6358410c93e83d6536e43cc941f2102666d4c415a52e1b0866cf541dde3217e14531cfb7df6594b4b056358ab807dd0f5c84fbe550f97168660aa6da2fb008a76bde511a974fabb5fbc50bdd02a390e0922edef93ed7ecbe09666f61b8bd31df5326ce7218b73653e91f9f799a2c827548e5f83874dff41119430ae77c7441e71bb9307a3dafb12f2611ad360de54e480f9f4cf018aaafb4be34275c2f253321577fb043fae52142f06803cec4d7d5f2d53eb18eee0338516f9cc529d0bd0b4380c2b959e47ee5000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000017c0)=r3, 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffde, 0x0) 14:19:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x6c, r4, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}]}, 0x6c}}, 0x20000010) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x9c, r4, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc0000000}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf72}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5adb}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1d}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x20044010) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x88, 0x1, &(0x7f0000000080), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000005c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r8, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x4c, r9, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="542ed5d49aee894c8ed1ea57b914ae55"}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc0000}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r11, @ANYBLOB="7df7000000000000000010000000ec3dc6957026ba43398662a68d250ac8d421b122b3fc9c3029369f0cdde47f244ffff58a28fc67cea0d078dc05"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000880)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xd4, r11, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7631}]}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x38, r15, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000805}, 0x20000004) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r14, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x30, r15, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x80) fstat(0xffffffffffffffff, &(0x7f00000008c0)) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000500)="070d601cbe5d909b72a10a578107c74f1f74a8e635436e12e956e44c99b8e29a0a83d2ec4ce7a156dc88b48dfe9fedf26bf7a518f906eee5ade9", 0x3a}], 0x1) 14:19:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0170a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000e00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 422.545847][T32736] FAT-fs (loop3): invalid media value (0x00) [ 422.551866][T32736] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0180a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000001100000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000001200000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 422.711719][T32755] selinux_nlmsg_perm: 72 callbacks suppressed [ 422.711729][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=52536 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 14:19:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01814, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 422.750562][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.770354][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.799153][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000001400000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0xfffffffffffffffe, 0x1, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xc, 0x0, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r6, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) recvfrom$packet(r5, &(0x7f0000003380)=""/33, 0x21, 0x40000040, &(0x7f00000033c0)={0x11, 0x1b, r9, 0x1, 0x1f, 0x6, @random="763ab3745969"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000001500)={'wg0\x00', 0x0}) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001b80)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$sock(r3, &(0x7f0000003180)=[{{&(0x7f0000000440)=@isdn={0x22, 0x0, 0x3f, 0x6, 0x41}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)="3d321961ceb8fb991447e356c108de86a5dd75b1e367cecb36dc00fd9d1ca66c0d8145611d275e60ffa528dd270c7aa587ac3e01e3c8afb5b3b021f62b82b20394b0dc6f9471d51ed89dd6bb6856b9d0bf9a91ad3637a7faf7c65f00e0091b3ee493a9cddf4a975c799137391eb6e875e9ea0dcfc3e98f3f08b5c6a321d501274b800f900cbaae1d5df69eb4a26f7e34761e513237b03b2511b362183d0156c4303d43e15cb59c4a1b3fe9a5d85b95f1ec0357097fba231e2135655293c426cde9d045ba27780903aff2fadfbb", 0xcd}], 0x1, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff8}}, @mark={{0x14, 0x1, 0x24, 0xfffffffb}}], 0x48}}, {{&(0x7f0000000640)=@caif, 0x80, &(0x7f0000000940)=[{&(0x7f00000006c0)="5f890fa62416bbd0be6b5c394d3f2950e44fd3ec96a7bdb12f8ebd6d0925645f2ffd72055608d46a9641fbf324827ae8725cb522036049230a62b7c2f416f775b78683350a276c364eaaa4fd819ab6b990b0c3b347243897d88ac253e3200adf1cb4e4396d367b1fa5c3527e4f1c5c40cfb017eb55a1d8c514909e319350585d31541502d828c0754a26d9e14ad1adce7b4ada72a1fcae3c6e7a5f15f5d0042a095d1b0d1fa760603394843b64f1c2b81839", 0xb2}, {&(0x7f0000000780)="e37a25b59462a8ed402e34e6853d8f03aaa90dff52547f018647b428fe8fb440448c84ad3699dc0a5fde7fe1cac749c40600f0582897a6494a23b820e3c659cb7908755a41946df8444b15abfb4d0b4e2141f7ef34382c0ed57945f2fb74850a33e072cfec3a8f556ed5cf00c6a8054d8136b98123b4b810414afaf656119bf10c091372fb039b591ac4b9f411cc12b4d2366e1eff8e41aa9a6647ab1da0d55996afc9d86c2798faff5b8e936efe05e5eb00", 0xb2}, {&(0x7f0000000840)="e30d8747d31ed09681226b87984ad7a15d66c632731e49ad36bdc9cb52bb2ce25cd50e934df679d8c122831d8ade9ca887d88672aed4daf5ef611edffd91041e2f12c616c730acbc60afbefc17f5d108b25dd83aad2b0ed10ac7324391b05d5d8e5a6e4c410f3d01c32222ac77895796afce1139bf656b1174799f", 0x7b}, {&(0x7f00000008c0)="6e3c75a291d1020055e2f213c9d4970daa0646f59ce8fec6279e183d771dab3f259666a6205b5d881702c07d4991029dad8b7f546cf77a51a188ed6189613c5f2df30b5cc5bbc06993269491d5923b5d", 0x50}], 0x4, &(0x7f0000000980)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x9428}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0xc0}}, {{&(0x7f0000000a40)=@tipc=@name={0x1e, 0x2, 0x1, {{0x2, 0x1}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000ac0)="1ae57afed0391d13ee5d1ee4a550eb0609047dfd0ecc4af054d98841a609723d2c3f849ea936865676d61cc7721233d1f6e3e491f6cee63a1bbdb92487027a35", 0x40}, {&(0x7f0000000b00)="26bd5f680b09a541fc8e21aac7aa736452049b4be222c1af3077f9a0be073aaf458315764e8a82cacd526b7396fc0c5d70f011bb2a35caa12f41aae75fa016003036cb20f24261d4883e54e64f8f430d5491c327f29f01ef010b81dab3aba34f313d2ea616e6ea95c7cf16bca43ba1335b705998d6839486ca3070aecdc342e9e63aea358ad2b43e5c501854750722711b591ec81acd0665ba5df9dd7e9440c14641cef9cb87365a70c4fbe3aef25006856ca716e35c1e522664f92f7de59c592ddf8de43454642a8e6ded9cadfa0ff74711840c53820d5cad254f", 0xdb}, {&(0x7f0000000c00)="b5221ed26762f9ba2c45b0daa008cecbc0ad83a48e218639655200d5f95906efc67a66b462567e84f25e168a4d35ed53c52a11e3872bbbc636879dd19cb5f8bd234b257587b9d5c0be6a3709fe", 0x4d}, {&(0x7f0000000c80)="e2309ea6a2f573e08ea0f9e018813ac6a9c9be1fae0dd21f07d3548d1ae5948aafe80af7680fb1a3a0be62e2ada1285ecd45d177b4709f7bf6989fd01cba9a1816b4c4abdc7cba6654260a6a61e7bfa49084256e3a2e2fe32d9bcdbfcd58ac93ebe10223b207e1caf74aa5027174b1fd1f243199a2b0cbb87a91e40ec9f058d035c8afa7cb30362ab42a65cd89b6a4178677", 0x92}, {&(0x7f0000000d40)="3a52418fa9798a0f045183067e78e960ea3d311c474a9e97e01323c85dc7efea5a2484033e48b52a9e39171e70e6e3be7bc967ef61eb25b3c4580da92707185131", 0x41}, {&(0x7f0000000dc0)="113bee08e500090a0a163ee0a248ad0fc5f298748d50d2cec3fb4b019a1918e51a2ceebda2bffd3b215af2bf770eae490010407c3b988e1780d9d42df86b4afc56120c13ea781eaa3ac08d05e8298fd82b5a570750601165d6a56a60731857e49d4d848d744b9bc21f496dc29692602b270f9870dac2d5c85c38d9212a063c30227875ddf8e3cc02007437296463fa855ddd77a72cf8c3941b17cd44a54a439e7f89f9e9c003f50b73b6f5", 0xab}, {&(0x7f0000000e80)="cda77c9d65e87d9cfb206705dd4ee11620bf7cfa7c892df1464ae1e7f4b018bde6c859dae939ddc8936decb8621feabcf270789862f20ce73695e3b6e5b805272be9bd9c4193a93279d965b2b5dc89", 0x4f}, {&(0x7f0000000f00)="5f26e60961b7a8132e93af2f348edd08d176341e86ca9d6237e9a32214f7add79e33df3521885fc915d58058551c2675923f7cd90ef0741f59f3c154b8313af4f9dab1494b07583b9a2567f6b432d19cfd2b0c661ad93e9910ef22e3846c1bedeeb6a88cf4a3253c77ba2c951b3a4edf816eea3985326fe6e894d127975751cb63310e04bf6ca5056603dace950a95dd2a0291f718be8c96c11f2244fc846bcdd9ebf85d3cb7a8ab9e1380ddf648eb010062369a111ed13bddeb6a6560114565464c", 0xc2}, {&(0x7f0000001000)="95b3b0e412e15a08476a47cae65b6349d281ca6f502122dffbeb819519a741e671b4756f106b6a01b4b33c157b09d7a40a065bc77c589583bda2bdcdcb6632eb796742880d7de513b4b72a282caf9cae783d1fae46d5ea81761d86815c86396f09d01bdb214a8d604613f4213ccac0484550bd9104c0da7dd91f65bd48691a13260fe5", 0x83}, {&(0x7f00000010c0)="3d1e20219cdf1f8d75a158b08043b37699b56adee2d7ec33f16624e449af4fcfc52c317ce1df872a36dcc771e937c3bbc7ae3420690c6f2b8cf8826d9041da54493546a152dba4ad499d4d8426de3b30d33adf07ecf036167c6f3769c7564e250b6e8b5d972830f248be4d1c7f510874f4f54e2c884e84efabe5ace0f1844aad01f8c13c6c75dfbc93e2585e10e9bd330c6045788cc040c3544615d5813ea67a8586da80495e0cc0d33aa905cf8d3d5510", 0xb1}], 0xa, &(0x7f0000001240)=[@timestamping={{0x14, 0x1, 0x25, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0x1f9}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffd}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x57b}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0xd8}}, {{&(0x7f0000001340)=@pppoe={0x18, 0x0, {0x0, @empty, 'veth0_to_batadv\x00'}}, 0x80, &(0x7f0000001440)=[{&(0x7f00000013c0)="bcc502a8c2dd01fedb134d8dff7498ba193b401de280c2c529ef2c4a6cdf13f3e3aa279372b0590c0ab9bc03861c325271e4bcda091a14bfbc4cbe3c9187beb81c11e3d5a9b3a888493a7d6da1c684022f0c7b703a9a2c8dedf850f6881f4b4632e4060b7b0517fd9c3056aed07ab67932a9788a784c4d", 0x77}], 0x1, &(0x7f0000001480)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x400}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x100}}, @timestamping={{0x14, 0x1, 0x25, 0xb6}}], 0x78}}, {{&(0x7f0000001540)=@xdp={0x2c, 0x8, r10}, 0x80, &(0x7f0000001880)=[{&(0x7f00000015c0)="8c780ae8182e7827a391dd8efcb7b07dd078fe7058d8ed7a0de868d41bb7f16f4460944fe390229798c825c98633c6d4bb616d574e126ebbf8bf7335db7abe34a77800d86624c098ac261fa2ffdd267e437b889a878340f51824a714ca724ae4748adbae92f1d867ee6e25a5a7901a1c1d03447f2bda11fedc6f9269d9495d19160a7bf18f3e255914ad075b259c6ee6b8b767b4a7ac79a8dd", 0x99}, {&(0x7f0000001680)="2748b07bd9b3da722ca39aece658b5d436423cdaf54a497a68dfbc7f806947810fe90e4b761eb59f31ef14692fe362aa69ab712535daae7f0f19", 0x3a}, {&(0x7f00000016c0)="252de9830677d0f868ac15578f806b849d98aceb0f7453e260dfc93fbd02a5754279", 0x22}, {&(0x7f0000001700)="0d35c490a770eb17353f243926314d24fb130387f452620afc3f5e19a64fd9604cc515184721497a882791bb155501d36776fde840eb135382e9d14849651246c79463355f351aade3cfd5fc23982d99516b4257d1b0cbb946b56a29f4b4ac1ff8ca8b6a25514e64cc895843287051d6634547e7baefa2985266048307997879f1688dcbef09edf891dfc36af3eac59fe317be6ba7e0b8fbaf", 0x99}, {&(0x7f00000017c0)="76e7680d06a5756447cc5d39dbaf7fc92fde798c65d37020f46ca68e9648df5d85909c4922bd4bd2bfa9d5d273b543d7e830937cb3cd13c1247b22ed1bd013cc9b0ca01867afc03d53ad37f36ad1bedbdffade2f1a7f9da277abe8a8b9bbe1d771680de68776556a4347e31d2fbb36a60c49ccd6303fcbfef69d3dc2ba292db34664b34aecb4aac5d75c4433f6dd2631dff2993db2bee4db5837521bb5db7ad3d0eaed33d9e5b3f9c56687b648b5acd2664a0999b00e52d3793c64", 0xbb}], 0x5, &(0x7f0000001900)=[@txtime={{0x18, 0x1, 0x3d, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0xb66}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xd4}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f00000019c0)="5cb38a9e379fce6583d38a8fbf430e0478945c8df05e75c48f8b49", 0x1b}, {&(0x7f0000001a00)="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", 0xff}], 0x2, &(0x7f0000001b40)=[@mark={{0x14, 0x1, 0x24, 0x9}}], 0x18}}, {{&(0x7f0000001bc0)=@pppol2tpin6={0x18, 0x1, {0x0, r11, 0x2, 0x4, 0x1, 0x1, {0xa, 0x4e23, 0x733, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x401}}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001c40)="1299e59092a8621b1427e4ba32e6cb74fd992649f1cd060d4f7f48ba", 0x1c}, {&(0x7f0000001c80)="e1870dadbb99e6a8346881fcbf15a8223fb6a79cfec977d4305fe2067dd9e0a0b4f4e14ffa931390ab4d9e3dd958808e6811ea7a8da281d8dc268adaa72254459264046f459414559a72959681270dc226a3088dd9", 0x55}, {&(0x7f0000001d00)="57fb3c34e3d5eab9aa71e2e030ce0377068d39c2fd40ad8ddd436671034df1756e3d564c4f003ab85b", 0x29}, {&(0x7f0000001d40)="99f884a325855b6595f7b7862d7d512349669a94d363204b4f53a93475463d72106730859ca190c4798911f698474e41bf74175baf94f7b6bc364f9a1524564c6db9f4bee8ef2fedb59b96a064cc59e6268934e69814798d73e444c63b084b68c7205afad472837c44ee63293443f09336550382c067e4ae4239286c827affc647ff570dc69ea16acda24ee87ab7c7cf27ac2fb080c21c35b6075dd99f5ade68460dc8973b5852dd602e762809bb0ae8928a3e07c32362428d5bec1fa2ffbe9224d664", 0xc3}], 0x4, &(0x7f0000001e80)=[@mark={{0x14, 0x1, 0x24, 0xfffffffa}}], 0x18}}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000001ec0)="b5bbb21a0fbd23d353f7cfb602b89dfed195b8af4122aab2cb02bbff8d46d841", 0x20}, {&(0x7f0000001f00)="987ee888d0c7e706efc3216b65d4adbb00015b71d95cf9b0814c57a7afc7f8421ec9c1b82ef0a64855a468aabd13d0f9ab02c23f2bd7e93763decfc3c98ae266274cb5bd2cec818b205c67594f2e5aeb965c41a8bee550cc8eb3b521018ca6a011206dd9b3c71f27269c264edd794bc7f9848856bd12434cbdac56fc847972ae1bc1d0af6115ea6031da2064ea5fbb42d8a356cef21f2276401a7a6d581e", 0x9e}, {&(0x7f0000001fc0)="38e14de369e3a29377cd3183b485e6ff3188e520b675c5925d7037f6c13c1bea4da212968f923aa3a19b7a3bec591cea071d747327611c3b250784f1dd724f19c4c6b4999da18b78be47ba89c9ea243417cfd3ccf592ad7652018115d302f59ab6befb8a527ff69d4e88d9ebd287fd3cd55740095e2ff9f06a50c4ed3eb1d446daa87ec51fef5eb5f192ebbb05616bd7b54ae9c6f1164a50e27dcb1de66acc35e0e69829e4825a1a430e9dc74090709fe949f56bbacac5f29260b44bc59c9842e2ab41e377402466514caea5a5b12bfb76b564903af49d7849e58de8714caee844d3dcfff188898a2fbdbe2d0a16143fe03b59c157ae31af729a947b450f4f3a8f608c1d8c3446cc8d87336217063a4964ed7de383cdaffb799e5666694c995f8da46c2ae7f17d10fb249092f095af9e66929175c0c3d52a37d7f07ebdadc100994a579de0a9dc1c026c07dbffa410f1849169038218595247e5f3e93a49ad406aced730a594ec8cdf980e49ac0f5b477716ed71b25b3b0185e11217f295aa5f7e62b32d28002fb7838e2728ecd82ce07cdbf03ec98900ebd694b2a176b87c7a95d81d3cbdc0cc4c08807c9cb39e1a0d578a98632ba081e7601c507976de28ee88721abd52c0b98913fdc688f8819d999d54859edc28c170bdf8fc759ee7cff4bc2ee35437824a41e0f3a2a1b86af8b1ab83ffb3e829eb6759f2864810703e60f49d684642e3cf8e16cbeac3d631a5ac7b381e716e59c2fa82ae89bf08b7175ab63da04403aaf34b22c77bcfb131461ee8e3627e6d33af2a66f8a90a049fb1716e16f3a76020f4b04b9bc1503900856556673c76c056eaf6966fc52526191b48d2d274d2e625abd01f7968a86e2049dec850ee8da66b274afc178ed086c8f9a8ea89ad7c04edffdc9c001cfe700e7fb27df3d6da8f453c54bf0780059a3cf1f1a730758ee05501be32901d7c8b9bec934a68a513ce6b371f4d8a954f9fa838d1cc5314eae2223dd07039072200741afe46c97b78ed4cb123dad8eb0539cdc778421c19a48d3bddb202a9b401d609bf853fa5f5d56b81d22dbeab11890c859fd89743ade33543432f76f6b9c7d8801028aaea08221008d561eecb16b05f6e738858bd1b96b292bf144730532e7134b28e0f1aceda39a0223d31afb0ec1c5f198af2c4e35406f7bddee82426b32119de92adc8d74a5691d0674be0170760893a15c5e385c9ab0723777dcad1dc2b60637f354fb6f8a09520256f76dfd2f4087fd783357ad67f247b236f8da97f653566603b7cff6d40da1836b48d7edaab310f18fcd490b6846b623ec1c6e37fa9ab2d76821033f8a639a749a4267a57c538db566121984ba8bbf816b75cd4425efaf0b0e7bac5c7461d24c2b18250fab8abd49960faf6a4781c0434b20200d8dd66ae4353325be32e8e26b447b54a2bb95284545e5de2b29538cddbad3a48c5272793f66230a6d984b62ba34bc76f30a5016f989bc4a85be3c992e95fb5540f31fc0711dcdd5bf8be73037d0d44a6f21641296fbcf26f055d84e10331d35169561411c50ef178cb7df25f17d16f6c36245f7ad32f150e1a2e2520e73236a3ee380535b64de454f4226e02a525068ada9343ba19bdd694b9a393e143edea4590043b2668bae5b3e8092e4ee11b1897ae1e17a7d5762f245f8e358a64d276deb7da31976580394a510d6e61f9ae87ec0a99c4f3ff48f7e31a1d520ac7c30dcfe9770f17a4a750af3fb6d005f52d462c5b0a58a3db3a9437c9b445fac1c3ce80c109375d518d37d586eab571c33c32079b14cf575574c8c13c38304c59456431d5c6a6e6cebc0370b01ecc571b66428ae86e60f8604a771a89fbc1879bdd53ea70a5c0ffb561163d95a894ed6cc14aba8edcf974492df681e9339c260526c1457dfbd5c66915b2c7da8730b1a0af435c5deef6eda908bbd5ad0fc121d60d8a3645b7348725bd38371e2203870eb249e6035cab8e8d74687a0787e28249d67935fb0e46d1ca348bb1ce59c6d112f39dd762f01dc5182d9e39badfc70d370642ccb8c7fda9549d4d7a7af15e9cd644e97d3e4015475c480602f65830e5dfc38064186bfc44294ffef083af3e77793da2e0c4f1f7e69ad921272e6331f37483d6c6929170b8de583a0177a3cd7cae4f41a82cf318505a251dee59f14cf4338a20b2b1464145da66a8c06875e079f17fc0bcf70da1fd48f0554f196c17e20f783a84e8e25f11e01a0f3f61a62084391d2d4da21b795a60b058bbb6b2acc9a06fc12398f48a3dc77c88daaf775a516dbb70edffd0802a24c6f7645d13540b5edaf808848482ed50d9af9559643a656d9d7dbbdc4727cc22ea66941be8b4ece6c4065818ff64bc6b6acf61397a8a5f908d7d6c4b3c38b68ebca4910e523bca02e644072e7701e3d40aa56ab7ad3ededea67379f01841d0d969ac67a8a01145cf0ce8d8b54476cc94409dfa25645ad60be54d5af75b261601ffe4b79317918165648332e4ff1860a1808c09305db1130f8d1a84e4aa38462e0e7c9a90ad2e314e252df9835e8a7ed194706ffcc75346a2ba762b4b763a418ed249c2deba80a83dfe4ea934062546a4999f9405e9710d1056a4968f40863a4b7551d8f4a6a1e148079eef57da79cae79885dea56b237006d2765d37674ce0b1903ec413dfc4b396d2ec45b3a5b64ee72737a883296b7072a164e076e47de237c7f338901bebd542c088ed609c46dc2d3927fc3cafd621ad307e94351173aee962ecb994d5a1908552d3fa672102a1cb40847f183e03db7a4643a1f62464aaeb90df527978cf15ec69ddb830249f668e12a1ca8aab2720f718f3ec3461d20440fdbaa48107e7a4ac851b49693e2df04a8db0b2115ae8a374033be62202c4318d3fba47e8f86ae91a5159d34ce2538ce47c88f78cee4a057638a26c3a98a5e6c7d79767c72cad3309221e8f9648ba63918cc2cd721c32fae6dfdf139b2cecc01fc5c0cef837dde690e71c372700f964938677c97bc1224f3089afcbe2702bd4f00486ded0f25f57fa278528a379ad26475a51a63af359b533568ee45355a2fe3e3d7650149b0c7ae8ac264dc3d5f65dfc460754dfb1a024f2700e2a09d9f6a78c85f5ddaee97976906f541689bf4e3b2b723c9b30ee270f4bf53fd3cae84c2667c2a5e2926d4a62b5724ec7267811b4839a2538b7b3dd3cb36925b9ff57f0c250f4a6bcb33f980de4fe710beb991e3e6f105ef41f0c66773229f16685a1f4bcadee1ebf054c24eb8ab90a695d24e5983b32a971f427d7498f8dca49eb8db22df690e330979d3319115e1058b0b0653a2664d2bccb2103b819577c16ebbc5ebc63754456e4049e985e6a11c312b38c8d40accff12baa4bec74ab6c01e15f4627730f200776aaf271755d8333296deefc69617382a6243802117152d09edeba3bf8911d2f61ba9c96b48200c3ea789b4697ded27c3a85a81dd18d42b58e491042d24e1efbfb8092e82c915f660483a4dd3f12639a49d2597f4807cc8b7ed5a000cc69374f7bf5a2bee2373bf3788036334e9f6a290bfdddbc031a53c5aca35a497c77d2b654a38920fd3b57855646341efc77f0e36c8960453e6393a61c5f4708a05bc9f3cac19cebc9052459888843bffd326d37fd09279e31cd5b008ec1ced0291a8423eac33dc3b36d45fb6d8bf4413f975b6edcbfbe2b31044b45ba83b5a538e10954c3b2c5b03e34a0e65418ada94a132856b0cda7129b9a5034c5d6e519cdfaf3b7e99693653ecd7eb8e334ec2aa4fb07adf5c0af68aa17c9bdcbcf53b5d400c83baf535742242f00e81859414cc8bb5e904b94b4827593959befd739bb0c58accab3176c3804edc46ab587aea3c849179abd1ed0c272db5c42d6305895e2c6f0348da92954a6ce2f70042bfce75b1d0f7143d4abd515711b8e491b7f7570c5f07fc41878c6692968169aa201578f84ccb267f4c77b900c65615f4cedc1a3f1559fcce5fff0b492791c666b9b737adcf7fae2f1d1e7e108d8ee41d4aeab82a31400a4486bdd1180948178a076526b4e533cd6c700f02dd82645535e4e4436e5540ead74cca22aa20f36dfd8c124b597d529602a29f7da2f9a268849d55a9769d22ea3d5b932cca504ad58aa6f204b776be8dfc0e023f209176a469661e2ba882b9e4a29dac1c7ba707a6e31097a1aa7bd945db20c709aa146eba57616a5c10d124394e92c13ec8757a74f7b657967db49d874fe04e0e371eea5cafbaf21b3e9518e45af904520f50e85afc52dc1f756489658c6ab3ac5f89ece4ebf67f579784c702ce06b605715340607e562175443422b046d354954acdef760abe4d3a5ae7fc732f9dcf40df0736ae5042a2dd3078c9f72256548f8811ef8f2066c67dcb22c72ef84afb31f1cfc516f7807fd4aedcd1ffd82056ff864454125d3e9f3c93e04a8df5fe7fe2b845e7c8b877c4abc27c8c0980db90b06bd492c9627e0617f7f8b9feafc16f3fdfe8823aecb09d38c05a0d037ca74eaff27a5926f277b983bd09a55ac1d839390380485f53ad8a17a16f6075d09550cc512002bfd23d6425c24fb814623634aa43b879b04522061b8ea64c3103cfcc7ad3dbc1c7e349433735a93326e086342ae6229d2dab626541cba96464ff4183a5deab3da54037b01c2c091f7eaaf09cf6ac6e1b728900b2fb1d7089805e162e1f3ecb123de40a06e6f000df54271a63a371816937e0e4eac1dbd493ce602bc4ecf6932499a3d9a0df3c43b1a489b7a0b1627f22323efeec784eb2370479b59c4243aab466deeee78c33b6c923876496e98607be0e3272a797795f06b9ca6db780a91e6bdc97949203c12c795a598fe6e9e7fdaaf97319a5b3e76796d91bbe3f7fcd6edc9f75d768b76a0064519a3a8856b93a91e32e679e7e78f0c701dac0db06bb77d58e3447e0e86ce24a37b2aab7fafd549df03bf478cd9314d5bab701b3d7a3f6110e4daadb8ca8b180798c96ec86cb2eb14c7ed55e0aadf4273f34e2b564cc5cc6f683c99e0dc4859e1702ab5dff4ce64210c5e7d95a87f54efaaf620a371b1b2872e3e35cd3dc31b9d8231f44f684b93009e44ba074ab9d882f4475189ab26bee08f2e2f02966e4c8eec7648dd44deeee20fc8ff91633b5a94e0f4d64004b5f540e38ae4673fd15c5050b2fbb1d95841b22bcf0642bb056671ff6ebf9d1b7657db8bc7facf28f65d2265799ae8687efbcbc2f4a71d27c9b139bb0ae1f6f0bc77ccb50399760d6be969f2406f0213f8285c41fe5bc17944c004c81e12a0eab1d4cff11cd94225eb37ebd005aa3835c93309df608f3b364f8ebdb13536b13df802df06e320c70b64d13858c164183b02620fdbedad39be6b5c50d20cb46df012445a3c438691b14435ef9077e2bb8e504ac2aa40dd13f7d24fb6eac5367bf2f5f96245e2a1d9baa4019b120d41c5def94cb7da4e9feeb7a1862bd97ff8a28c2568113533772d62ddeb478a588affecd5f89997b5824cbc2db59b8304b0a5c7f7b943e68ac9c151f5334544e9c44106e66d1dd1efba963f48696131b394ef9d8a7b20f3cc3e7642c9fba9e2a5a8f7b5320ad6eada74188d7133432522c86a529bc796085c019ae163e3fad53516f81ee2df9bbca4cb1d6230dc30044c05933dbe3f954b2f771efde6d6f97a118daa016591b8f61b9550d81557d492ac7db5ca1b87fd822980cb4dfde43355b0a4d43117a79a11a03f5f3d85d262f43cb960ef29cc5a6c527924dac4b075f37b921f0199307741b52a6e20bdb5539b9d284d720ba82d06284f64e1", 0x1000}, {&(0x7f0000002fc0)="e19644e5513bd4fc218d6f7a0b0700ac0c2d4bbb053f09309187066a7ad0a91ff547486554773a30ff8b13210da551df96b5aed6c5b84561d630965f94160e25c638e4a5732c18c5a263207241a5e4de3c648d35f2b96e9b5c07bcf8595ae5ec932603fd3a318b1a64add3892f1b4beff0342f531d74129a051add0b87d9ff20ba6dff0c49407ed75e07ed64d63cf8c4efab751bad1423c226a00c0aefbe802ce3fffddeec7f716a65517233236357d5673aaea82159411d80f1ebbd473538bd4d2d95e633c5e749f12946", 0xcb}], 0x4, &(0x7f0000003100)=[@txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x10001}}], 0x78}}], 0x8, 0x4008020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r2, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r14, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003400)={&(0x7f00000002c0)=@can_delroute={0x64, 0x19, 0x1, 0x70bd26, 0x25dfdbfd, {0x1d, 0x1, 0x4}, [@CGW_CS_XOR={0x8, 0x5, {0xf3, 0x7, 0x2, 0x5}}, @CGW_SRC_IF={0x8, 0x9, r14}, @CGW_LIM_HOPS={0x5}, @CGW_FILTER={0xc, 0xb, {{0x3, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x1}}}, @CGW_LIM_HOPS={0x5, 0xd, 0x4}, @CGW_FILTER={0xc, 0xb, {{0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}}}, @CGW_MOD_SET={0xffffffffffffff6d, 0x4, {{{0x0, 0x0, 0x1}, 0x1, 0x2, 0x0, 0x0, "9a31be40279f6e02"}, 0x3}}]}, 0x64}, 0x1, 0x0, 0x0, 0x400c890}, 0x40) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x2, &(0x7f0000000280)=ANY=[@ANYRESDEC=0x0], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r15, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 422.893369][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.929834][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.947259][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.963877][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.980027][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 [ 422.998203][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32755 comm=syz-executor.1 14:19:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'geneve1\x00', {0x2, 0x4e23, @remote}}) r2 = socket$inet6(0xa, 0x1, 0xb3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = getpid() sendmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="f4", 0x20000201}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000018000000000000000100000001000000f144c41be0644856b5f13da321547f21320ee60d7b27efed5a9fb4fa012b115c41346e4fdafd146f137067b39d2291acc4be3a89b2fbe395f20f813f768e45d22d4ecddcd6de39e224017f7f45b7506eec40e199198fae21a3c0a0258908c4bf81513894ff6fff23527706f5969503c8dc30a5a4625c496b461faad607091134acd10a", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x38}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1}, &(0x7f0000000040)=0xc) 14:19:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000002000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 423.199315][ T334] __nla_validate_parse: 22 callbacks suppressed [ 423.199321][ T334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc0190a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r8 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r8, r9, 0x0, 0x8000fffffffa) 14:19:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000002500000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7ff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) syslog(0x1, &(0x7f0000000440)=""/135, 0x87) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd75, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4680, 0x3, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(0x0, 0x1070c5, 0x0) ioctl$TIOCEXCL(r4, 0x540c) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000001000f31828433979e304400000000000", @ANYRES32=0x0, @ANYBLOB="0005008900000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES64=r2, @ANYRESDEC=r6, @ANYRESHEX=r7, @ANYRES64=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r0]], 0x4}}, 0x0) gettid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000600)={@multicast2, @multicast1}, &(0x7f0000000640)=0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x314) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={'macsec0\x00', r8}) writev(r3, &(0x7f0000000600), 0x0) writev(r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x1c500) pipe(0x0) socket$packet(0x11, 0x2, 0x300) fcntl$setlease(r5, 0x400, 0x2) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2f6a82, 0x0) 14:19:39 executing program 5: ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x7, 'caif0\x00', {0x9}, 0x4}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x20, 0x0, 0x4, 0x100}, {0x9, 0x1f, 0x7, 0xc67}, {0x0, 0x0, 0x1, 0x5}, {0x8000, 0x81, 0x7, 0x7}, {0x3, 0x8, 0xff, 0x5}, {0x81, 0x7, 0x20, 0x179d}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000100)=0x8, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x0, 0x3}, {0x0, 0x3}]}, @func_proto, @enum]}}, &(0x7f0000003580)=""/4096, 0x56, 0x1000, 0x1041}, 0x20) 14:19:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01a0a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RFLUSH(r2, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r5, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000004000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 423.490074][ T352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01a14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 423.641078][ T375] FAT-fs (loop3): invalid media value (0x00) [ 423.647963][ T375] FAT-fs (loop3): Can't find a valid FAT filesystem [ 423.670151][ T378] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:39 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938017f000000000000005380fdb7bb6ffde95a5f"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x2, 0x200}, 0x10, 0x0, r1}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000004800000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01c14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 423.819660][ T391] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000004c00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a404000000000000000000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16d02eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000840)={0x3, 0x1, 0x1f, 0x13, 0xa4, &(0x7f0000000440)}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x34, r7, 0x42b, 0x0, 0x0, {{}, {0x0, 0x3}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x1c, r7, 0x1, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) 14:19:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01e14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x1, 0x5, 0x7, 0xf10}) r2 = dup(r0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000200)=0xc6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18130000", @ANYRES32=r2, @ANYBLOB="00000000000000005f5afeff0800000018230000", @ANYRES32=r6, @ANYBLOB="0000000002000000182a0000", @ANYRES32=r2, @ANYBLOB="00000000020000000920fcffffffffff67aa2000fcffffff28800200f0ffffff95000000000000009951000001000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3}, 0x78) 14:19:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000010005fba00e8ffffffffffffff000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(r0, &(0x7f0000001900)={@void, @val, @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @local}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8035}}}}, 0x62) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x10003, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet(0x2, 0x3, 0x7f) splice(r8, 0x0, r10, 0x0, 0x8000, 0x0) r11 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r12 = socket$key(0xf, 0x3, 0x2) getsockname(r12, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001900)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000001a40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r9, 0x0, 0x24, &(0x7f0000001a80)={@multicast2, @loopback, 0x0}, &(0x7f0000001ac0)=0xc) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000001f40)={'veth0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r9, &(0x7f00000021c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002180)={&(0x7f0000001f80)={0x1e8, r11, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r13}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x184, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r16}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xa1c, 0x5, 0x1, 0x6}, {0x0, 0xff, 0x0, 0x8}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4008091}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) accept$packet(r6, &(0x7f00000005c0)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14) r20 = socket(0x100000000011, 0x2, 0x0) bind(r20, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r20, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r21, {}, {0x0, 0xffff}, {0x0, 0x4}}}, 0x24}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @multicast2}, &(0x7f0000000740)=0xc) r23 = socket(0x100000000011, 0x2, 0x0) bind(r23, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r23, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000000a40)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000007c0)={0x240, r11, 0x100, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r18}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x14}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r19}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r21}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9e8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r24}}}]}}]}, 0x240}, 0x1, 0x0, 0x0, 0x800}, 0x800) r25 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r25, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r27 = socket$nl_route(0x10, 0x3, 0x0) r28 = socket(0x11, 0x800000003, 0x0) bind(r28, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r28, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r27, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000010000108000000000000fbff00000000", @ANYRES32=r29, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000640)=@can={0x1d, 0x0}, 0x0) r31 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r31, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r32, @ANYBLOB="000000080004000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket(0x11, 0x800000003, 0x0) bind(r34, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r34, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r33, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r35}, [@IFLA_MASTER={0x8, 0x4}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000880)={0x240, r11, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r26}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}]}}, {{0x8, 0x1, r29}, {0x1a0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r35}}}]}}]}, 0x240}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r36 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = dup(r37) getsockname$packet(r38, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r36, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r39, 0x1, 0x0, 0x6, @local}, 0x14) getpeername$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r41 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r43 = dup(r42) getsockname$packet(r43, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r41, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r44, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wg1\x00', r44}) r46 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r46, 0x107, 0xc, 0x0, 0x4) accept$packet(r46, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) clock_gettime(0x0, &(0x7f0000002080)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002000)=[{{&(0x7f0000000440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/116, 0x74}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/106, 0x6a}, {&(0x7f0000001740)=""/155, 0x9b}, {&(0x7f0000001800)=""/43, 0x2b}, {&(0x7f0000001840)=""/87, 0x57}, {&(0x7f0000001980)=""/212, 0xd4}, {&(0x7f0000001a80)=""/153, 0x99}], 0xa, &(0x7f00000018c0)}, 0x5}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/44, 0x2c}, {&(0x7f0000001c80)=""/206, 0xce}, {&(0x7f0000001d80)=""/68, 0x44}, {&(0x7f0000001e00)=""/125, 0x7d}], 0x5, &(0x7f0000001f00)=""/193, 0xc1}, 0x7fff}], 0x2, 0x40000102, &(0x7f00000020c0)={r48, r49+30000000}) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000022c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002280)={&(0x7f0000002100)={0x180, r11, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r39}, {0x164, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x78d45243}}, {0x8, 0x6, r40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r45}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xcdb}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r47}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r50}}}]}}]}, 0x180}, 0x1, 0x0, 0x0, 0x40}, 0x1) 14:19:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(0x0, 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc01f00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:40 executing program 1: unshare(0x44000600) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40505412, 0x0) pkey_alloc(0x0, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20c000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x34, r4, 0x42b, 0x0, 0x25dfdbfe, {{}, {0x0, 0x3}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x4, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x1c, 0x17, {0x2, 0x7, @l2={'eth', 0x3a, 'syzkaller0\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x50}, 0x240088d1) [ 424.321934][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 424.349698][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 424.358809][ T419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xf, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x6, &(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES64=r2, @ANYRES64=r4, @ANYRESOCT=r1, @ANYRES64=r8, @ANYPTR, @ANYRESDEC=r0], @ANYRES16=0x0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES16, @ANYRESOCT=r4, @ANYRES16=r7, @ANYBLOB="104cc026f94904fa0583e7ac62627b0564ad31c4006d6780c38b504275f86176857f86521afe41"], @ANYRES64=r6], @ANYPTR64, @ANYPTR64=&(0x7f0000000800)=ANY=[@ANYRESOCT=r1], @ANYRESOCT, @ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRESDEC=r0]], &(0x7f0000000340)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3, 0x4, 0x8}, 0x10}, 0x78) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/meminfo\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r9, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:19:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000006000000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 424.504835][ T451] FAT-fs (loop3): invalid media value (0x00) [ 424.510850][ T451] FAT-fs (loop3): Can't find a valid FAT filesystem [ 424.533087][ T445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000006800000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) 14:19:40 executing program 1: unshare(0x44000600) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40505412, 0x0) pkey_alloc(0x0, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20c000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x34, r4, 0x42b, 0x0, 0x25dfdbfe, {{}, {0x0, 0x3}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x4, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x1c, 0x17, {0x2, 0x7, @l2={'eth', 0x3a, 'syzkaller0\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x50}, 0x240088d1) 14:19:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000006c00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000007400000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 424.650550][ T460] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.672634][ T464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.761418][ T479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 425.524551][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 425.533471][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:19:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x40}, 0x204}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x2011, r1, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x10001) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, 0x0, 0x7, 0x5, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7fff}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1000}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2c3c759c}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xb08}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x200}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xaa}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xc0}, 0x40) sendfile(r0, r2, 0x0, 0xedc0) 14:19:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02010, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x10000, 0x675e, 0x0, 0xffffffff, 0x3ff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000007a00000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(0x0, 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x4000000000035}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 14:19:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02014, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="2801000017000700000001f100000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 425.839195][ T506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 425.843053][ T508] input: syz1 as /devices/virtual/input/input33 [ 425.903106][ T514] input: syz1 as /devices/virtual/input/input34 [ 426.001214][ T527] FAT-fs (loop3): invalid media value (0x00) [ 426.007340][ T527] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:41 executing program 1: unshare(0x44000600) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x3) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r4, 0x880) write$selinux_attr(r1, &(0x7f0000000000)='system_u:object_r:getty_exec_t:s0\x00', 0x22) r5 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000040)={{0x0, 0x1, 0x0, 0x0, 0x81}}) r6 = dup(r5) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r6, 0x54a2) 14:19:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f4ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000002700006a0a00fe0000000085004403c6820000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112ff0056e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}, 0x10}, 0x78) getsockname$packet(r4, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0xb8, 0x1, 0x1, 0x401, 0x0, 0x0, {0x1e, 0x0, 0xa}, [@CTA_TUPLE_REPLY={0xa4, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={[], [], @broadcast}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr="474f4732a2161d6582396b3382343e17"}, {0x14, 0x4, @loopback}}}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20084004}, 0x8084) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000700)={@mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="6886949f4bc817a6737871ed8acbe87b", 0x4, 0x5, 0x3, 0x400, 0x1, 0x11, r6}) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000640)) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x88, 0x1, &(0x7f0000000080), 0x4) bind(r7, &(0x7f0000000440)=@phonet={0x23, 0xb7, 0x7, 0x1f}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r5, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) r8 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r8, 0x0, 0xfffffe20, 0x0, &(0x7f0000000000)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet6(r3, &(0x7f0000003d00)=[{{&(0x7f0000000780)={0xa, 0x4e22, 0x10001, @local, 0x101}, 0x1c, &(0x7f0000001980)=[{&(0x7f00000007c0)="b6070b73ce5bc568cdc296df4307a374cec687759869fdd9e1e2e746f990b6b22d8fbfd2df2dc3bead351c85820892f8a6ee56b78db33876569a2587822720ee1eb82fc40d347347f10b37b6c48c8e728b3ea91467437bab0631a5f9eb7c8b605b2238b578df837ff551c90c70", 0x6d}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="7272adf49b94cfc84b3fabd3f71cbc3202af6b7751", 0x15}, {&(0x7f0000001880)="82503185110efb756e02878ed697eba0947f67b90cf218575e411e094337e7b0bdce71994664096857dc86470759b4d77149c2ea41755d5dc420b9612d4d53a20523b6633e064fe44b8d9909b507b4c9f00e20bc626df577a9c22aefd85da16c106741a7635b8d92def697a04f3eab7747b436ec2d692c593c2f8918905ab79b36e64200993b4ae32737d4668f49a9c762d5a72a640ce51e49f4c72780a2b13cf7373884a8bc62b74c505b25c41882e0b0baf9d5cd1a093341579ae269f063af326fc221078c155405fef2bbbb806e87", 0xd0}], 0x4, &(0x7f00000019c0)=[@hopopts={{0x108, 0x29, 0x36, {0x21, 0x1e, [], [@hao={0xc9, 0x10, @remote}, @generic={0x1, 0xd6, "3211bdcb160b6c3eabdd2c5a65d010cfe02d1632a30b0d8428ba3e76cb9f67a1483115dc43a67f9fd2dfc739ecdc295e21da02a1ada28c795f9dbdc712ca94dada50a1163600deacf23203ac333912d9cf5eae43998292f5a8e4bbcfe2822e462a735febf4378a4235f030f458e4c12720a89f6312260e0eb84a0682d33e98f50b1f5b5114a81587c5d275a6b37a2dd2a4f8a0394cc2edd0fa0e94a6e3d01a8bce7a74914224887a1ac26a1513770cb42751266f48f7b00c345c3c01fd1d715096e89564f528a9726ac374527b28fd5663f321759584"}, @jumbo={0xc2, 0x4, 0x2}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}], 0x120}}, {{&(0x7f0000001b00)={0xa, 0x4e20, 0xffff9ff2, @empty, 0x1}, 0x1c, &(0x7f0000001bc0)=[{&(0x7f0000001b40)="a9029480b0cd002732e94dd19d5a85423dee9ea84f45227eb398e0ae8b2b762a546f3a04c34f34b41220881f5eae9809314a9df9f7727d4342afe906c098c953734d245a29cf35af430121213583ecd2d9f05c8b3fc320", 0x57}], 0x1}}, {{&(0x7f0000001c00)={0xa, 0x4e23, 0xec3e, @dev={0xfe, 0x80, [], 0x40}, 0x1f}, 0x1c, &(0x7f0000002fc0)=[{&(0x7f0000001c40)="8a6ad3361b1d0e659ab5e5a5a3eb9b023af8a5e82476ba9232b158bfad83327525147336ad60f815d30af42aafe505efa5ba5b012bd738b1fc85b5c76e647039c9da4abb", 0x44}, {&(0x7f0000001cc0)="fce1016513e8252d0f1ddad3bd8b603f27201882cf0c2f85b9bdcf61b2f085006c2d243c0f17f96f3e7630bad6a6ca9ab15a560d6bb5f41bd677f54d24cb9ecedf91c1ca42f5178663d8810e0f7a9efac1c84fb28bfe0e9591bec7e6ab015f9b967da478b0638f3be670ff2289443705a7cf", 0x72}, {&(0x7f0000001d40)="eccf911e5b2a38d7b34efd716ffefe30", 0x10}, {&(0x7f0000001d80)="a5eaf19476706530d204c0e942df41cee88da90c021a5755cf8d72c160e7bcad36037282d3c19e", 0x27}, {&(0x7f0000001dc0)}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000002e00)="d14799b6f15f3c3286c920b1a8b1dc2501ec6f8d80bf0c7b1bde25159d36f76d0a32a4b505c196fdf3d8f6b09db9abc20b9df956d17baab442a7b4387a38fb119b370e3a310f899760fb43c8d1ce98e304319756d7e9e7ca", 0x58}, {&(0x7f0000002e80)="86a5dbed0c5fde36b56346975837dfb52e49ab469c6354ee3f2c6e5bdc3d50cacba16214fe1b79cff4287a0e9d10f1729d523ec04402885f5249adc37c8a9eeea93908fc24af1952fff7547f3160d687090c70acf71afc4f293304b8ebff8e64446d7a52b4a7127a088ac5e118e00d883b3051b0", 0x74}, {&(0x7f0000002f00)="b154fb681f63928ad00f107da7788666c5", 0x11}, {&(0x7f0000002f40)="4a64c95ccff2a54621d87b5f4fc7773d71aa01c5a66df270798e800cb6876fe9eee31a68acfecdbd08259235d2a238bb9cf2b8b4c6d9f33d2946e1f87ef7581bb49d4d884d4617108a9f410f1dfb1c9a93b33940b97870ae58a4eba5e40170834d6768", 0x63}], 0xa, &(0x7f0000003080)=[@hoplimit={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @tclass={{0x14, 0x29, 0x43, 0x80000001}}, @hopopts={{0x48, 0x29, 0x36, {0x3a, 0x5, [], [@pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @ra, @pad1, @pad1]}}}, @dstopts_2292={{0x58, 0x29, 0x4, {0x2f, 0x7, [], [@ra={0x5, 0x2, 0x3e25}, @pad1, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x28, {0x0, 0x8, 0x1, 0xb8, [0xfb, 0x6, 0x9, 0x6]}}, @ra={0x5, 0x2, 0x2}]}}}], 0xe8}}, {{&(0x7f0000003180)={0xa, 0x4e21, 0x2, @mcast1, 0x2}, 0x1c, &(0x7f0000003740)=[{&(0x7f00000031c0)="5059aaf8daa23d45d3c6c06bf235c7576022d238a169e65bc862fc4c468c954fdfda486f1725439bf80855430006a1864a4cd3e1727e4777faf5fdf0fadec385016fde978cf9bd212ad7dd729907437698458c32eab5c637f5dd79e9a3cf0117c67c06370654371ee006c8f1a782c72f9d9bc007eb94f4873bc398328b5687bb0c9ee93bdb22dd33559dd66c9f2d55f706bf084ce5738b5506c23560f13479d898af0602651a46850dced7c0cb1f89e449f8360cdb55954288dce41fe63b3bf99fbda3a0b47321b534c5267af55058bdfbf8b73fc1080f91b60d9630ea5502d0e4426ff31e328969d5f842b322746162461faeb4300af0f05a8471ab", 0xfc}, {&(0x7f00000032c0)="2fccb935c3713f1568bed43a725eebbbb0114e7524c8cfcab85370d7b2dd8f880518a4255a97f3b3931f45ec9b3aefc69d4c038a61c217", 0x37}, {&(0x7f0000003300)="2a692cca0a1212324167d0309bb24c2fe5f58b543f4c3ed7b617f1", 0x1b}, {&(0x7f0000003340)="830342b8eafbd5389526a6b09ee43eb02f56586f03b9b2e07ebf3f036cfdf7e39b6844cf24c09a270d5076161f56b30b32f9e5c55ed9f948f8359b1ef5f26292c72138b73e189efa13ff2c513e1e88ab46f1f97be927ca28b601de91fe805c72623aab1b5f0e11379a6ee939452ad77130d53c1525d95eacea5143a94984b5e4a4029b2d", 0x84}, {&(0x7f0000003400)="6dbff5004473dab7d29f404ede190011108dd6fa37fbb9e433db25b79e4ca0d0c7eb8e20564e44b1fcd0e1a174fc49bdbf32c7cf745212abc9264c91165350e3eba2cc190144034afc40ee871764e3dfdbe770da2c010c17e0e1fa2df3db56c248d9eb22fddfef6bda4ad2e7f2071a4e902fe4a1c567b82bfeaa49517816a4a33b9c9882aff1934fda584ac3aeab20c22c98b8f9de51", 0x96}, {&(0x7f00000034c0)="799152a5b5904f02bf5807af1b924192dca4be88d02b6220725a2357889d9e2b0628f6d6bf3c9c7e4a681432abefb084bc9effab51465c1492598c5e3bf3e5bfa0236be21eb828e1ef3307169753b77a5268029cc3e2d541d4352ef125da1f5fadf36e6ea07c601ab8883b7f856c62e93941d908cdf13d8e747efe4c2ae7660cd86175aecf4e7ae9a83ddcfc9c15ff6a41a9fd77696c2ab410", 0x99}, {&(0x7f0000003580)="31a3d9f484acc6c05b3785b65ef06b6f29c63360fdec720b0ca3a8a1e69b8459c24d12dcb34e84b702bae6b0", 0x2c}, {&(0x7f00000035c0)="cd4a339580b5d93de11550b8258ef99ad62eeae05c35ce44936fd2517d5ce81a6436a6ce94bc7e84c4d70160544dea0da777c05e072dc822768c3ba8c8453ddd537644ba5eb8be7eeddfa556ec4ec3e3697132b0d9ae070deb53da3e7453b3c1f488234fea5beb1d812bff88da55007f054440743388ff57eaa6267ef23b39092b437aa41416f9936e9cd199a6a12e3774138e3752e39738275c5d0ae3914b4b4d48d9e6515893b8cc489ac4594f53a73171e8fe290b72f917216beb508ea0d03c6bb292acfed1dd5fd6997631ea87cedb7cf98861a5ecc55c857ba4c523fa", 0xdf}, {&(0x7f00000036c0)="08150ac9c1c2ec99b9e36f08a19ab4f3deaad863991a36f3a2116896e6e0f8347a1fb11c012c9eb814ca7386b960db862f6771a66c778a82e517a4b3ae4fe81adfe7b03dd74340dc2c9184452b5d6d77e26ff4e04d95", 0x56}], 0x9, &(0x7f0000003800)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x2, 0x1, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x7}]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0xc, 0x1, [], [@enc_lim={0x4, 0x1, 0xff}, @pad1, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x2c, 0x0, [], [@ra, @pad1]}}}], 0x88}}, {{&(0x7f00000038c0)={0xa, 0x4e22, 0x9, @local, 0x611}, 0x1c, &(0x7f0000003ac0)=[{&(0x7f0000003900)='\nhS', 0x3}, {&(0x7f0000003940)="175a330e131da5689e49feebd358ffa8de5207542114f6a2200852be7e7c3db5a2d4ebe604ec794f697809e4180fc16386522121", 0x34}, {&(0x7f0000003980)="0a1d4a5e7d807eaa1aff0c2f507233d069b4fb17fe7b6564f29d662f3474dbcaa788883f5bbc79fa51eb42e47568c3fd382f6368fad49cf844201f2056c8e4193ca1e828303085e794320bdf9a87f71391b0fbec33fd73b062b5fdf0869aa81aa3e4e1f7ac9a288878db818bf4d36c5d04989f7861e3ef74b09b8633ab436de15359a17abd5cd39ea5c0ae9fbc9f70ed7a6de3413f1bd6b818ecb312f60edb7596c7c6a9fdc77c287247efae393942c9f02868e7561fc7567359b0cf7a47de78b8713b358622870f", 0xc8}, {&(0x7f0000003a80)="32f89b49969fc23a3fb231985487888d9fee6dccdb24567eee55d8221ce2124f85b82dcf1b048d", 0x27}], 0x4, &(0x7f0000003b00)=[@dstopts={{0xb8, 0x29, 0x37, {0x3a, 0x13, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x8, 0x92, "bf6e0f4169ca939655f4ba20f5c470dc6fbcb7b3464286d364882d64d851ccb1a51c949b67b1f56687577302cfe5e5493e4ec4469f331bcbc7c056b50478fd2d5323f09f7592071f7fd3561254c2531381be26b7d19ebd724785c9f0f086956364e7fb7f3e32f779e73f95df006a5d9b71bd22a583328aa1fe9d2d1ff032595cd1ec910f658e65de83a706fb8a4c438c25f3"}, @pad1]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x2b, 0x4, 0x0, 0xff, 0x0, [@empty, @remote]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x3a, 0x2, 0x1, 0x81, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xfff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @hoplimit={{0x14, 0x29, 0x34, 0x7ff}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr="55426ab7bd67e81bc589c6b28d7d9b20", r11}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @dontfrag={{0x14, 0x29, 0x3e, 0xe69}}], 0x1d0}}], 0x5, 0x20000900) 14:19:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02200, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000004003000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000340000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x40}, 0x204}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x2011, r1, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x10001) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, 0x0, 0x7, 0x5, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7fff}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1000}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2c3c759c}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xb08}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x200}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xaa}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xc0}, 0x40) sendfile(r0, r2, 0x0, 0xedc0) 14:19:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000a00080000000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10800a0, &(0x7f00000002c0)={{'fd', 0x22}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fsname={'fsname', 0x22}}]}}) creat(&(0x7f0000000100)='./file0\x00', 0x18) 14:19:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(0x0, 0x0) ftruncate(r9, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000010000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02214, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='./file0\x00', 0xa5) unlink(&(0x7f0000000040)='./file0\x00') syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000580)) bind(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYBLOB="961539dcef92eb7483aa19bea1b864fa9620a3fee90dfc2c00000000000068c51c9a4d0489555d42be4672e033bc080000000000000085d19bab0db1058dc8b031c55d28fdf94b3cf7c0cd93253e147b7c0924ac6396021b3b2f5aeb8c16f3"], 0x2}, 0x1, 0x0, 0x0, 0x44045}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 14:19:42 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0xfffffffd}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) dup2(0xffffffffffffffff, r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x5}}, 0x10) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7}, 0x10, r7, r8}, 0x78) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 14:19:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000020000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02414, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) socket$inet(0x2, 0x80000, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000030000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000040000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 426.944321][ T599] FAT-fs (loop3): invalid media value (0x00) [ 426.950476][ T599] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02614, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000050000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r6, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000280)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x8, 0x110}]}, 0x1c}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000500)=0xc) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=@random={'btrfs.', 'eth1\x00'}, &(0x7f00000003c0)=""/56, 0x38) sendmsg$NL80211_CMD_STOP_AP(r5, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r7, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_INACTIVITY_TIMEOUT={0x6, 0x96, 0x2}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000844}, 0x40005) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x88, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_mreq(r9, 0x29, 0x1b, &(0x7f0000000440)={@empty, r8}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02814, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:43 executing program 1: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) vmsplice(r3, &(0x7f0000000000), 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000440)={0x2, 0x1, 0x2, 0x7, 0x90, &(0x7f00000007c0)="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"}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) timer_create(0x0, &(0x7f0000000300)={0x0, 0x3b, 0x1, @thr={0x0, &(0x7f0000000640)="26b50375910e71d0df8b91d545df47e83700d326f6064c63663e01392b41a3aba7dfaa91d96f2d2116704faa1c5b85960a34f8e995757bcf35572816a7d3af653f8344ed2861825106c90fa79cc0fe425ec788f09430f3b145"}}, &(0x7f0000000340)) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r6 = gettid() delete_module(&(0x7f0000000380)='*usersecurity\x00', 0x900) ptrace$setopts(0x4206, r6, 0x0, 0x0) capget(&(0x7f00000005c0)={0x10040291, r6}, &(0x7f0000000740)={0x3, 0x99, 0x7, 0x3, 0x9, 0x9}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000006c0)=""/115, &(0x7f0000000080)=0x73) 14:19:43 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0xfffffffd}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) dup2(0xffffffffffffffff, r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x5}}, 0x10) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7}, 0x10, r7, r8}, 0x78) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 14:19:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46c00) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0xe8, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0xffffffff}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0xab9, 0x3}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x80, @multicast1, 0x0, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20010, 0xffffffffffffffff, 0xff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c113503000000000000008128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:19:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000060000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02a14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 427.741399][ T664] FAT-fs (loop3): invalid media value (0x00) [ 427.747686][ T664] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000070000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f00000000c0)={0x5, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xece) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r5, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000080000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x9) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f00000000c0)) 14:19:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02c14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000090000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:44 executing program 4: ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x401, 0x0, 0x5c, 0x5c, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c90000097152d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a", &(0x7f0000000440)="4b1943045cf95c8ba0b9f7a7a1e6fd571e250c1e810cedab653bd08ead25c2725ead56dd72982e585f158d62beeff4b7542d395450e9c5e0b50100000000000000ac0222e14df9a8923439af078f470a8e1f80b6b6552d29a2dd647b"}, 0x40) [ 428.367689][ T699] __nla_validate_parse: 12 callbacks suppressed [ 428.367695][ T699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02e14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc02a14, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000a0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:44 executing program 1: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) vmsplice(r3, &(0x7f0000000000), 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000440)={0x2, 0x1, 0x2, 0x7, 0x90, &(0x7f00000007c0)="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"}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) timer_create(0x0, &(0x7f0000000300)={0x0, 0x3b, 0x1, @thr={0x0, &(0x7f0000000640)="26b50375910e71d0df8b91d545df47e83700d326f6064c63663e01392b41a3aba7dfaa91d96f2d2116704faa1c5b85960a34f8e995757bcf35572816a7d3af653f8344ed2861825106c90fa79cc0fe425ec788f09430f3b145"}}, &(0x7f0000000340)) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r6 = gettid() delete_module(&(0x7f0000000380)='*usersecurity\x00', 0x900) ptrace$setopts(0x4206, r6, 0x0, 0x0) capget(&(0x7f00000005c0)={0x10040291, r6}, &(0x7f0000000740)={0x3, 0x99, 0x7, 0x3, 0x9, 0x9}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000006c0)=""/115, &(0x7f0000000080)=0x73) 14:19:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000000c0)={'vxcan1\x00', 0x2}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000000e519c0a30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000950055000000000089c81f202f3d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e6163fb112cf6956e09d1938013c217e0f6ae3"], &(0x7f0000000340)='GPL\x00'}, 0x48) membarrier(0x40, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc03014, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000b0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 428.535158][ T717] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc03214, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00009800000000000000ffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72e893ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63f4d291969feb112cf6956e09d1938013c21"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000640)=@urb_type_iso={0x0, {0xc, 0x1}, 0x3ff, 0x3, &(0x7f0000000440)="7949dd23c01db1e469458587bc3a4f97aa6e90f03f77b1476c24d63346b2204d3cec944d11cf803b71a8a2e3d799db3111dd15cda17a61c9393a35cfb32507e293e765273d9516c202d0ec10ac18cf2197cd9747980686a22052b12087ae43969702b0fec3918d4b79f8c42b87cd56476eef65eebd6f6f9e3e1ba7ab172899557b4e4f961987678716cea97e7bcc6f6e5e0ca4b847e1dcd3e9c738ef3e484e1d84737f3f33a52254ae1a9efe0b854fc9709e68dec02b0d35a4c3827a66ce68ae28cba8", 0xc3, 0x3, 0x3f, 0x5f, 0x3, 0x0, &(0x7f0000000540)="f713e9ff2bb387119c497908ede3d6f438206267539f749b601191b9f931114fd8a2820e2ddffa24d4168b74931362a1180ed80f93fed2cd6fc8b12082fa30cff49ac2a9b65908fdb45f131c7cd8fd811c903589d2ed2c9ab858982b1384976a042e83919082d3f7db6decc787804a4528e034eff69590b9aad886ebecf3359bfe4570c1a532e086c24e9cc53fdaf2091792d5a25c8120fbbb35726f6db02cc7f16dbebc06054ffd37707ddcef25549348d04df48c141a049b5ad5c430af8d8a5e656af652e50a5fe19c849146bba2b7f245386765a770f8b6f9f0f30cfe2aaff0b5992f4efca48c1a605676ad", [{0x6, 0x6, 0x10001}, {0x77b0, 0x80, 0x8000}, {0x4, 0x866e}, {0x1, 0x101, 0x81}, {0x5, 0x3, 0x5c25}, {0x7, 0xca8, 0x5}, {0x101, 0xe96d, 0x6}, {0x65, 0xffffffff, 0xffff}, {0x3ad, 0x7fffffff, 0x1}, {0x2, 0x4, 0x5c2}, {0x1, 0x7ea4, 0x2}, {0xfd, 0x1, 0x6}, {0x794bbdfd, 0x2, 0xfff}, {0x2, 0x6, 0x8}, {0x51f, 0xfffffeff, 0x8}, {0x7fff, 0x0, 0x35}, {0x9, 0x8, 0x7fffffff}, {0x0, 0x9, 0x7fff}, {0x0, 0x4, 0x40000000}, {0x81, 0x0, 0x6}, {0x20e8af12, 0x3, 0x80000000}, {0x85ad, 0x9, 0x2}, {0x8, 0x3, 0xf0000000}, {0x1, 0x3, 0x48}, {0x401, 0x40}, {0x7, 0x82e8, 0x934}, {0x3, 0x40, 0xfff}, {0x1d9, 0x10000, 0x81}, {0x6, 0x1, 0xffff}, {0x400, 0x9}, {0x8, 0xc47, 0xfffffffd}, {0xea, 0x7f, 0x1}, {0x6, 0x7ff, 0x7}, {0x6108, 0x40a, 0xfbfb}, {0x3, 0x2, 0x1}, {0xc3, 0x3, 0x80}, {0x8, 0xf056, 0x6}, {0x4, 0x5, 0x7}, {0x2, 0xffff, 0x1a}, {0xfff, 0x1, 0x8}, {0x1000, 0x6, 0x7}, {0x10000, 0x20, 0x5}, {0x7, 0x7f, 0x7}, {0x20, 0x20, 0x7}, {0x20, 0x8, 0x1ff}, {0x6, 0x8, 0x4}, {0xa3aa, 0x7, 0x3}, {0x3, 0x4, 0xe00000}, {0x101, 0x7fffffff, 0x2}, {0x7}, {0x100, 0x5, 0x8000}, {0x8, 0x769, 0x2}, {0x2, 0x8, 0x1}, {0x7cc, 0x2, 0x4}, {0x6, 0x4, 0x10000}, {0x6, 0x1000, 0x400}, {0xd8600000, 0x2, 0x7f}, {0xfffffbff, 0x9ec, 0x2451}, {0x863, 0x5, 0x10001}, {0x1, 0x1, 0x5}, {0x7, 0x7, 0xffffffff}, {0x3ff, 0x9, 0x1ebb}, {0x800, 0x3f, 0x7f}, {0x7fff, 0x5, 0x6}, {0x6}, {0xfff, 0x1, 0x1}, {0x6, 0x34, 0xfec3}, {0x5ee, 0x1, 0xffff2c65}, {0x8, 0x0, 0x7}, {0x3, 0x20, 0x8}, {0x80000000, 0x4, 0x4dcc0000}, {0xfc000000, 0x5, 0x8}, {0xba, 0xa619, 0x8a30}, {0x90c5, 0x8, 0xe4d}, {0x562, 0x5, 0x23}, {0x80, 0x9, 0x9bd4}, {0x7fff, 0x3, 0x80}, {0x4254, 0x1f, 0xffffffff}, {0x28f1, 0x7fffffff, 0xab}, {0xea6, 0x8}, {0x0, 0x7, 0x7a69}, {0x2, 0x0, 0x7fff}, {0x4, 0x100, 0x401}, {0x1, 0x0, 0x5}, {0x0, 0x10000000, 0x77}, {0x5, 0x7, 0xffffe854}, {0x6e53d74, 0x9, 0x2}, {0x6, 0x1, 0x1}, {0xff7, 0x7, 0x9}, {0x3, 0xe1, 0x7fff}, {0x2, 0x200, 0x3}, {0xfffffffc, 0x80, 0xfffff001}, {0xfff, 0x8, 0x80000000}, {0x4, 0x5, 0x5}, {0x43, 0x401, 0x200}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000c0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 428.595178][ T734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 428.687124][ T743] FAT-fs (loop3): invalid media value (0x00) [ 428.693322][ T743] FAT-fs (loop3): Can't find a valid FAT filesystem [ 428.787492][ T751] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x3}}, 0x20000000) write$tun(r0, &(0x7f00000008c0)={@void, @val, @mpls={[], @ipv4=@generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x2, {[@noop, @generic={0x88, 0x2}]}}}}}, 0x22) 14:19:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000d0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000100)=0x4, 0x1000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="0800000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7edfffffeffffff2d6405000000000065040400010000000404000401000000b7050000000000006a0a00fe00000000850000000b000000b70000004d0000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 428.876152][ T763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000000e0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:45 executing program 1: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents64(r4, &(0x7f0000000df0)=""/528, 0xfe06) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/59, 0x3b) write(r3, &(0x7f0000000340), 0x41395527) prctl$PR_GET_TIMERSLACK(0x1e) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) socket(0x1, 0x5, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r5, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000300)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000640), 0x4) 14:19:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc03414, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="f702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504fff2010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x10, 0x6, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) socket$can_raw(0x1d, 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) accept4$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x180000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000300)=0xc) setuid(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000001900)='attr/prev\x00') r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r8, 0x88, 0x1, &(0x7f0000000080), 0x4) setsockopt$sock_int(r8, 0x1, 0x2, &(0x7f0000000100), 0x4) 14:19:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000100000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 429.355135][ T778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc03f00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x8c, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000380)={0x5, 0xc, 0x2, 0x9}, &(0x7f00000003c0)=0x48, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0xf6}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r2}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000110000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 429.456267][ T794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 429.514317][ T803] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 429.544553][ T805] FAT-fs (loop3): invalid media value (0x00) [ 429.550950][ T805] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000120000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 429.766379][ T827] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 14:19:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x0) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc04000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 430.375251][ T844] FAT-fs (loop3): invalid media value (0x00) [ 430.381625][ T844] FAT-fs (loop3): Can't find a valid FAT filesystem 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000140000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0a00b7060000ffffffff2d64051000000000650404000100000004040000b1c98985713ab605400e17930601000000b7050000000000006a0a00fe00004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e13fb112cf6956e09d1938013c217e0f6ae30b00"/163], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSIG(r2, 0x40045436, 0x34) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) 14:19:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc04800, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000000000000000660000280000000000119078ac141400ac1414bb0d0090780000000000000000004c7bab529cccc5a16786daee00000000000000"], 0xfdef) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0}, 0x68) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r4, &(0x7f0000000140)="73844ae89d", 0x5}]) socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000240)=@v1={0x1000000, [{0x0, 0x7fffffff}]}, 0xc, 0x0) 14:19:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc04c00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) [ 430.561222][ T853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 430.597692][ T860] FAT-fs (loop1): bogus number of reserved sectors 14:19:46 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup2(r2, r1) prctl$PR_SET_ENDIAN(0x14, 0x2) connect$unix(r3, &(0x7f0000000040)=@abs, 0x6e) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x128) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000100)=0x8) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000200000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xc, 0x0, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xc, 0x0, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000100)=@req3={0x75, 0xffffff39, 0x6, 0x0, 0x80000000, 0x1000, 0x1000}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r5, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000380)=0xc) getpgid(r6) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000250000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) [ 430.612340][ T860] FAT-fs (loop1): Can't find a valid FAT filesystem [ 430.776654][ T860] FAT-fs (loop1): bogus number of reserved sectors [ 430.787293][ T860] FAT-fs (loop1): Can't find a valid FAT filesystem 14:19:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x0) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000400000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000280)='./file0/file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb82906d6b66732e66617400020409ed01000270a736", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1c507e, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) geteuid() syz_mount_image$f2fs(&(0x7f00000002c0)='f2fs\x00', &(0x7f0000001600)='./bus\x00', 0x8, 0x3, &(0x7f0000001440)=[{&(0x7f0000001640)="497bc5d2970c1d68462ba5aaf415ddfd7c163b0f46cd33df192a131d0fbda5dcacbd1afc3fcfe6c1bf", 0x29, 0xcb0}, {&(0x7f0000000380)="87c4be8f4a66c05545081a03ad75a91780440feaa2c1a0b56089ef45babd19a047c84f2becb8e09230b8b76c15aa496a85d97604c508e6ae675c0b3c121d1dab1d171ff1c67e21d85f69c35877817c808e67c26c20db2edc28c91bc0d9b755489b9bb90b86d703f9c5321a2c54d97ad771ed7ea209e5eae15631d211b087caf5d79e8a7606c846f206cffa72a69021e714e756b12ee623147392c25b946543", 0x9f, 0x3}, {&(0x7f0000000440)="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", 0x1000, 0xfff}], 0x4000, &(0x7f0000001580)={[{@noinline_xattr='noinline_xattr'}, {@noinline_xattr='noinline_xattr'}, {@nobarrier='nobarrier'}, {@disable_roll_forward='disable_roll_forward'}], [{@subj_role={'subj_role', 0x3d, 'cgroup'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x88, 0x1, &(0x7f0000000080), 0x4) splice(r6, &(0x7f0000000200)=0x32e9bd02, 0xffffffffffffffff, &(0x7f0000000240)=0x7fffffff, 0x7, 0x6) linkat(r2, &(0x7f0000000100)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 14:19:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc06800, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00', 0x0, 0xfffffffffffffe43, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000380)=ANY=[@ANYBLOB="79c0b536916c603e11f2f60100ffffff13fd45b6f9df85c3b28c9aaf9d13dfff000000"]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:46 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f00000007c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000980)="02b5183e326fb7bab55b7be156d2a8166d577aa1c7c17cab56bf7e23a6f6129836e72f1e1753443dac079b69d8db10708f8958658b49eec8944e3359900b74d791583e4b803de32e504606469c311fc509aa1244c796c9fd24560a4e523b3b687f3721a5b46848c4122e437f9d7c53f6bd9ba44abddcbf421c782c754b0d730d32c4989974430c6147ffe465fa0a5b3a5bfdf3364a7f6b4f7e26f64ba41d581be612284281d48a6508b4799b77f3c58deaeb761fd4573846b75871cdbbe1f8e003950a0b9c8c25f51ec65292248ad0590a5bae9b8ffdbd1817d768", 0xdb, 0x40000000000000}, {&(0x7f0000000640)="9aa32da3035038f101b60d5bbfd5ba2bd8229a124e44ae54cf9239244d7b435290e0f761e789039f6cd5ba1fe46def482e348e817527278b69a0e7b8f76d58764b83b616711c54e9db8b9a4ff6c3b227f522907ccd696918120b5b21a45848951f1dc00797a49f", 0x67, 0x3ff}, {&(0x7f00000001c0)="97a684c665e958b51347d5ec5b1648fd7305cc0a62297177a90a4c6aff7cec59a373e6e9c6dbe97b49cf51a3dba72911b86b", 0x32, 0x7f}, {&(0x7f0000000200)="4649472b328deafb3a4e77aa963c3594c67fe148d2400fe35887cfc1a798a7fa175ba0f31246d1b004d8e6728f225b42ae34799a5abf471f87d35d52fe1e3a811042feef5e72665667adfe405141fa766bb0bd52d952566f8c4bdbbd0aee56c7cf20ca9f51e521245440010c408bf4fce52b660374548a8ad65ea85c2f3b2bca2271f731b476acae8a129f0172c5977c42d5aba72eb7e147d15a87fd3c01b9c8c0e8894fe72e5e373f12b8c14b167c74eaf07594579ce60731df7b8797065adc0cd3f07454f9e9c0127998628c8c804f33a892b332afc678d2783eaab2cc36719ac3a346556aeed8", 0xe8, 0x3}, {&(0x7f0000000300)="34ed32f1eed5906375d47dba5456f2acb3f573024e820057242266d78bb5460889347c2238ebb45ee891ea9c7d9921748b72bba2f9d0ee14811d7ed08429421676aa3b32c62c01cf31916efbac533fd8f2c14006599f17f127725eb86e62d8c14d5c74f5f6554a490c6c2a4fa7ef26567aee233e37ba7d94549084a3eb0e1c59c1b3f5c844c99ff1eacbb4d225e98de53bf79c8659a157bdeb8f8afee77e8426275674114a08d732af", 0xa9, 0x3}], 0x45340be35664a2d2, &(0x7f00000008c0)={[{@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@uni_xlate='uni_xlate=1'}, {@shortname_lower='shortname=lower'}, {@shortname_mixed='shortname=mixed'}], [{@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@fsname={'fsname', 0x3d, '[wlan1}eth1selinuxcpuset'}}, {@euid_lt={'euid<', r1}}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000140)=[0x5, 0x7f]) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, 0x0) 14:19:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) write$binfmt_misc(r3, &(0x7f0000000440)={'syz0', "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"}, 0xff) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$usbfs(r4, &(0x7f0000000540)=""/4096, 0x1000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000480000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000004c0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000600000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000680000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1930013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 431.160631][ T907] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 431.214059][ T907] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 431.228751][ T946] FAT-fs (loop3): invalid media value (0x00) [ 431.234836][ T946] FAT-fs (loop3): Can't find a valid FAT filesystem [ 431.235389][ T907] F2FS-fs (loop5): Unable to read 2th superblock [ 431.494927][ T948] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 431.502833][ T948] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 431.511160][ T948] F2FS-fs (loop5): Unable to read 2th superblock 14:19:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000400), 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, 0x0, 0x40004) write(r4, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r8 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r8) r9 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r9, 0x0) lseek(r9, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x88, 0x1, &(0x7f0000000080), 0x4) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x88, 0x1, &(0x7f0000000080), 0x4) sendfile(r9, r10, 0x0, 0x8000fffffffa) 14:19:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="280100001700070000000000006c0000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc06a00, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@showexec='showexec'}]}) 14:19:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:47 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x88, 0x1, &(0x7f0000000080), 0x4) fcntl$setstatus(r0, 0x4, 0x40000) fstat(r2, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[], 0x0) 14:19:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) process_vm_readv(r3, &(0x7f0000000240)=[{&(0x7f0000000440)=""/218, 0xda}, {&(0x7f0000000540)=""/214, 0xd6}], 0x2, &(0x7f0000000a80)=[{&(0x7f00000002c0)=""/26, 0x1a}, {&(0x7f0000000780)=""/210, 0xd2}, {&(0x7f0000000880)=""/251, 0xfb}, {&(0x7f0000000340)=""/7, 0x7}, {&(0x7f0000000380)}, {&(0x7f0000000980)=""/250, 0xfa}], 0x6, 0x0) chdir(0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c00707065726469723d2e2f66696c65302a0957f3f85fe5b3254c457746706a39422cf66687ec8947a45c6d05cc5d3434141c05553397eb6b3c69413179d8c5353c5203b8459667d84cc30552549309c229b0085c1bbca687d85ff45c61d1f386e78d834f0cf29babceb990f8d55601fc488ed432edb49fc1c3e1d499b6e971ebebaff0b716ae1e506338985ff417a7267318923d9bc8d15abc142a385615065601082c044d4932a6aaefd48fc8413a565ca9c48abe794ebc330a74046ff9ebf31979e382c774fa8e9761ca983968fac8091beaffc8f00d47bc0bba03ae2211781342af159214ce0e1c1ee950289892994b88e7c136d2c9edc441cd1bd3321343"]) rt_sigreturn() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x4000, 0x1) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000380)) 14:19:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170007000000000000740000fe8000000000000000000000000000aa0000000000000000ac1e0001000000000000000000000000ffffffff000000000000000000000000ac1414aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1414aa7f000001000000000000000000000000000000004e2300000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000100000000000000000000000000000000000000000000000000956a"], 0x128}, 0x8}, 0x0) 14:19:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 14:19:47 executing program 5: syz_emit_ethernet(0x26, &(0x7f0000000080)={@local, @dev, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0xe000, 0x0, 0x0, 0x0, @empty, @broadcast}}}}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000000)=0x7, 0x4) [ 431.913510][ T985] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 431.945797][ T985] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 432.002403][ T1006] BUG: unable to handle page fault for address: ffffed1019858eff [ 432.010149][ T1006] #PF: supervisor read access in kernel mode [ 432.016152][ T1006] #PF: error_code(0x0000) - not-present page [ 432.022406][ T1006] PGD 21fff7067 P4D 21fff7067 PUD 21fff6067 PMD 0 [ 432.029094][ T1006] Oops: 0000 [#1] PREEMPT SMP KASAN [ 432.034297][ T1006] CPU: 0 PID: 1006 Comm: syz-executor.5 Not tainted 5.4.19-syzkaller-00492-g6387e43186c9 #0 [ 432.044506][ T1006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.054827][ T1006] RIP: 0010:do_xdp_generic+0x603/0x1500 [ 432.060377][ T1006] Code: 00 00 00 00 fc ff df 42 80 3c 30 00 74 05 e8 f4 e4 95 fe 4c 89 a4 24 d8 00 00 00 4c 89 ac 24 18 01 00 00 4c 89 f8 48 c1 e8 03 <42> 80 3c 30 00 74 08 4c 89 ff e8 2e e4 95 fe 49 8b 37 83 e6 01 31 [ 432.080072][ T1006] RSP: 0018:ffff88819484f680 EFLAGS: 00010a07 [ 432.086203][ T1006] RAX: 1ffff11019858eff RBX: ffff88819484f788 RCX: 1ffff11032909ef1 [ 432.094619][ T1006] RDX: ffff8881d161fe34 RSI: 00000000000000cb RDI: ffff88819484f798 [ 432.102903][ T1006] RBP: ffff88819484f830 R08: ffffffff82db065b R09: ffffed1039856f5d [ 432.110880][ T1006] R10: ffffed1039856f5d R11: 0000000000000000 R12: ffff8880cc2b7926 [ 432.118863][ T1006] R13: ffff8881cc2b7800 R14: dffffc0000000000 R15: ffff8880cc2c77ff [ 432.126850][ T1006] FS: 00007feda98cd700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 432.135784][ T1006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 432.142380][ T1006] CR2: ffffed1019858eff CR3: 00000001d0aab001 CR4: 00000000001606f0 [ 432.150388][ T1006] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 432.158458][ T1006] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 432.166540][ T1006] Call Trace: [ 432.169843][ T1006] ? __kasan_check_write+0x14/0x20 [ 432.175214][ T1006] ? _copy_from_iter+0x886/0xaa0 [ 432.180172][ T1006] ? generic_xdp_tx+0x4f0/0x4f0 [ 432.185037][ T1006] ? tun_get_user+0x3d10/0x3d10 [ 432.189922][ T1006] tun_get_user+0x2498/0x3d10 [ 432.194731][ T1006] ? tun_do_read+0x1f10/0x1f10 [ 432.199509][ T1006] ? __rcu_read_lock+0x50/0x50 [ 432.204290][ T1006] ? avc_has_extended_perms+0xb27/0x10d0 [ 432.209935][ T1006] ? __rcu_read_lock+0x50/0x50 [ 432.214750][ T1006] tun_chr_write_iter+0x134/0x1c0 [ 432.219933][ T1006] do_iter_readv_writev+0x5fa/0x890 [ 432.225163][ T1006] ? vfs_dedupe_file_range+0xa00/0xa00 [ 432.230777][ T1006] ? security_file_permission+0x157/0x350 [ 432.236513][ T1006] ? rw_verify_area+0x1c2/0x360 [ 432.241488][ T1006] do_iter_write+0x180/0x590 [ 432.246096][ T1006] ? do_writev+0x9e/0x560 [ 432.250438][ T1006] do_writev+0x2cd/0x560 [ 432.254694][ T1006] ? do_readv+0x400/0x400 [ 432.259061][ T1006] ? __kasan_check_read+0x11/0x20 [ 432.264104][ T1006] ? _copy_to_user+0x92/0xb0 [ 432.268727][ T1006] ? put_timespec64+0x106/0x150 [ 432.273589][ T1006] ? ktime_get_raw+0x130/0x130 [ 432.278372][ T1006] ? get_timespec64+0x1c0/0x1c0 [ 432.283247][ T1006] ? __kasan_check_read+0x11/0x20 [ 432.288283][ T1006] ? __ia32_sys_clock_settime+0x230/0x230 [ 432.294139][ T1006] __x64_sys_writev+0x7d/0x90 [ 432.298841][ T1006] do_syscall_64+0xc0/0x100 [ 432.303359][ T1006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 432.309358][ T1006] RIP: 0033:0x45c581 [ 432.313254][ T1006] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 432.333236][ T1006] RSP: 002b:00007feda98ccba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 432.341676][ T1006] RAX: ffffffffffffffda RBX: 0000000000000026 RCX: 000000000045c581 [ 432.349655][ T1006] RDX: 0000000000000001 RSI: 00007feda98ccc00 RDI: 00000000000000f0 [ 432.357748][ T1006] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 432.365736][ T1006] R10: 00007feda98cd9d0 R11: 0000000000000293 R12: 00000000ffffffff [ 432.373731][ T1006] R13: 0000000000000b7c R14: 00000000004cd906 R15: 000000000076bf2c [ 432.381799][ T1006] Modules linked in: [ 432.385703][ T1006] CR2: ffffed1019858eff [ 432.389861][ T1006] ---[ end trace dbccc29d488e50ab ]--- [ 432.395330][ T1006] RIP: 0010:do_xdp_generic+0x603/0x1500 [ 432.400876][ T1006] Code: 00 00 00 00 fc ff df 42 80 3c 30 00 74 05 e8 f4 e4 95 fe 4c 89 a4 24 d8 00 00 00 4c 89 ac 24 18 01 00 00 4c 89 f8 48 c1 e8 03 <42> 80 3c 30 00 74 08 4c 89 ff e8 2e e4 95 fe 49 8b 37 83 e6 01 31 [ 432.420730][ T1006] RSP: 0018:ffff88819484f680 EFLAGS: 00010a07 [ 432.426930][ T1006] RAX: 1ffff11019858eff RBX: ffff88819484f788 RCX: 1ffff11032909ef1 [ 432.434913][ T1006] RDX: ffff8881d161fe34 RSI: 00000000000000cb RDI: ffff88819484f798 [ 432.442894][ T1006] RBP: ffff88819484f830 R08: ffffffff82db065b R09: ffffed1039856f5d 14:19:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) writev(r1, &(0x7f0000000380)=[{&(0x7f00000000c0)="d8d5b3f22315e3ce03909ad3ec1a2030f07285420bd7bc63c2ac317cc5eddeda69312b0d3f15442cb65b2bbc44bd8697bc53dcd9501abae944c166899bcb8d4cd956810cd52d3fb379e8cc07b4c2f2c079c470e99afa23fdfebcdf2f22aa54425f08ca98c392417dd65f8c10a73882819115f5d2da1415dc1e56", 0x7a}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b73f060000000000bfa30000000000004503000000fefff67affff5f352fe27c6f7700000000b7b30000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085f84dd5cb000000b70000004dc50000950000000000000089c81f20273d16b72eb87ec5a3c8640a2661214329e9e4a2f97e4fa8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30bbd9851fbae949210bd1f8212df289f578f84b3e4f8ef4dbce34d93caa3ebc9bc537d18bcef7a67d363e3d506adcbfd274aa34da03ccff2e3dd5aa3fb95729b7257cf936c423d23c66b8278b6e59579be5958100f215df7f1b0fba1e72c8ca420050000005c88c7d3c0485b2e886703c03345c1e01e99759924e3e8bb249300"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000580)={0x1, 0x70, 0x3, 0x7, 0x1, 0x9, 0x0, 0x100, 0x1000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40400000, 0x0, @perf_bp={&(0x7f00000003c0), 0x8}, 0x10000, 0x1, 0x80000000, 0x6, 0x2, 0x7ff, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x88, 0x1, &(0x7f0000000080), 0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x88, 0x1, &(0x7f0000000080), 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) r5 = fsopen(&(0x7f0000000840)='nfs\x00', 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$IPSET_CMD_LIST(r9, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x58, 0x7, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xfffffc1e}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4050}, 0x4000) r10 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$P9_RREADLINK(r10, &(0x7f0000000300)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r6, 0x4) r11 = syz_open_dev$ptys(0xc, 0x3, 0x0) fstatfs(r11, &(0x7f0000000600)=""/152) 14:19:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7800030000040400048005000300110000000900010073797a300000000005000300060000002c00048008000940000000030800094000000005080005400000000408000640000001010800044000000004050003000100000006000240cc9d0000060002400200"/120], 0x78}, 0x1, 0x0, 0x0, 0x24000811}, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) r2 = dup(r0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x88, 0x1, &(0x7f0000000080), 0x4) fcntl$dupfd(r5, 0x0, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x400000}, 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:19:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000280)=ANY=[@ANYRESHEX=r1], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030200810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0xfffffffffffffd0a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 432.451019][ T1006] R10: ffffed1039856f5d R11: 0000000000000000 R12: ffff8880cc2b7926 [ 432.459010][ T1006] R13: ffff8881cc2b7800 R14: dffffc0000000000 R15: ffff8880cc2c77ff [ 432.466995][ T1006] FS: 00007feda98cd700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 432.475953][ T1006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 432.482548][ T1006] CR2: ffffed1019858eff CR3: 00000001d0aab001 CR4: 00000000001606f0 [ 432.490534][ T1006] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 432.498526][ T1006] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 432.506504][ T1006] Kernel panic - not syncing: Fatal exception in interrupt [ 432.514927][ T1006] Kernel Offset: disabled [ 432.519375][ T1006] Rebooting in 86400 seconds..