00400)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000f0000000500a9651d1730915fcd71be", @ANYRES32=r5, @ANYBLOB], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000480)={'syztnl2\x00', r2, 0x4, 0x5, 0xe9, 0x6, 0x50, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x7, 0x7800, 0x2, 0xc54}}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=@delqdisc={0x124, 0x25, 0x200, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xf, 0xfff1}, {0x3}, {0x4, 0xf}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x5a18a264}, @TCA_RATE={0x6, 0x5, {0x9, 0x8}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_RATE={0x6, 0x5, {0x7f, 0x40}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8001}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x40, 0x9, 0x7fff, 0x2, 0x10000, 0x2, 0x4}}, {0xc, 0x2, [0x0, 0x2, 0x7ff, 0x5]}}]}, @TCA_STAB={0x9c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7f, 0x0, 0x8, 0x5, 0x7, 0x7, 0xfffffbff, 0x1}}, {0x6, 0x2, [0x3]}}, {{0x1c, 0x1, {0x71, 0x0, 0x200, 0x1, 0x1, 0x6, 0x5, 0x1}}, {0x6, 0x2, [0x1]}}, {{0x1c, 0x1, {0x5, 0x40, 0x81, 0x80000000, 0x1, 0x5, 0x401, 0x1}}, {0x6, 0x2, [0x4]}}, {{0x1c, 0x1, {0x6, 0x4, 0x100, 0x3, 0x2, 0x5, 0x1, 0x6}}, {0x10, 0x2, [0x1, 0x80, 0x9, 0x73c0, 0x7, 0x5]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x124}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0x1, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="600004002100000429bd74f3351dde394c949674cb700a8014010008000f001303000014000200fc02000000000000000000000000000114000200fc02f200000000001d0000000000000114000100fe8000000000000000000000000000bb", @ANYRES32=r2, @ANYBLOB="d310e65e1bfe2a6a6607afd229f247e27fb5864fb54540bb34c071798ac183daae0b435e0c7757b8906687fa182ab72ed519b25b0bd61f7f43873c53507b9ae08b30fdc514852b8289ee7c56eabd8bc263c53f88b7aaed986d4eb0700c2ab6210dd6240c5e58156a3637c177e6bab81799c40936e80fd9ab2c1823f846a26067a4994fb1c31dc5b810e979245f011dcb2e4159718b3155f30c0949291816f3c0cd8b009a00000b6e8beb8b4d2b80de956739c52d6a012112d35bff091dc5fc3edb633937cb8ac4ab54e17541db528d5f54704bee641d1a997de763ac3edd3b1d8c", @ANYRESDEC], 0x60}}, 0x4002000) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0xa401, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x350, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0xf83d}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x50}}, 0x0) 00:41:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffdffff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000200140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffdf9}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:41:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffdfd}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) [ 763.295251][ T4311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41", 0xa4}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000151b00003d0301000000000095000e0000000000712600000000660d81be93e852744ca371008ae00000bf67000000000003000000000fff07f0bf0500000000e92f0f650000000000006507f4ff020000000707000000008d08497baeb0794b5dbf54220000000080070500000400f9ffad430100000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000f0000000500a9651d1730915fcd71be", @ANYRES32=r5, @ANYBLOB], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000480)={'syztnl2\x00', r2, 0x4, 0x5, 0xe9, 0x6, 0x50, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x7, 0x7800, 0x2, 0xc54}}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=@delqdisc={0x124, 0x25, 0x200, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xf, 0xfff1}, {0x3}, {0x4, 0xf}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x5a18a264}, @TCA_RATE={0x6, 0x5, {0x9, 0x8}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_RATE={0x6, 0x5, {0x7f, 0x40}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8001}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x40, 0x9, 0x7fff, 0x2, 0x10000, 0x2, 0x4}}, {0xc, 0x2, [0x0, 0x2, 0x7ff, 0x5]}}]}, @TCA_STAB={0x9c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7f, 0x0, 0x8, 0x5, 0x7, 0x7, 0xfffffbff, 0x1}}, {0x6, 0x2, [0x3]}}, {{0x1c, 0x1, {0x71, 0x0, 0x200, 0x1, 0x1, 0x6, 0x5, 0x1}}, {0x6, 0x2, [0x1]}}, {{0x1c, 0x1, {0x5, 0x40, 0x81, 0x80000000, 0x1, 0x5, 0x401, 0x1}}, {0x6, 0x2, [0x4]}}, {{0x1c, 0x1, {0x6, 0x4, 0x100, 0x3, 0x2, 0x5, 0x1, 0x6}}, {0x10, 0x2, [0x1, 0x80, 0x9, 0x73c0, 0x7, 0x5]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x124}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0x1, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="600004002100000429bd74f3351dde394c949674cb700a8014010008000f001303000014000200fc02000000000000000000000000000114000200fc02f200000000001d0000000000000114000100fe8000000000000000000000000000bb", @ANYRES32=r2, @ANYBLOB="d310e65e1bfe2a6a6607afd229f247e27fb5864fb54540bb34c071798ac183daae0b435e0c7757b8906687fa182ab72ed519b25b0bd61f7f43873c53507b9ae08b30fdc514852b8289ee7c56eabd8bc263c53f88b7aaed986d4eb0700c2ab6210dd6240c5e58156a3637c177e6bab81799c40936e80fd9ab2c1823f846a26067a4994fb1c31dc5b810e979245f011dcb2e4159718b3155f30c0949291816f3c0cd8b009a00000b6e8beb8b4d2b80de956739c52d6a012112d35bff091dc5fc3edb633937cb8ac4ab54e17541db528d5f54704bee641d1a997de763ac3edd3b1d8c", @ANYRESDEC], 0x60}}, 0x4002000) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0xa401, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x350, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0xf83d}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x50}}, 0x0) 00:41:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffdff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000300140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffff7f}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffff85}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000400140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffff8c}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 764.183356][ T4927] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x40003}, 0x10}, 0x78) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$l2tp6(0xa, 0x2, 0x73) clock_gettime(0x0, &(0x7f00000009c0)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000940)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/126, 0x7e}, {&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f0000000200)=""/108, 0x6c}, {&(0x7f0000000280)=""/128, 0x80}, {&(0x7f00000004c0)=""/212, 0xd4}, {&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f00000005c0)=""/111, 0x6f}, {&(0x7f0000000640)=""/89, 0x59}], 0x8}}, {{&(0x7f0000000740)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x2, &(0x7f0000003d40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000006000ea9eb75d1d64000000000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0}}], 0x2, 0xa102, &(0x7f0000000a00)={r1, r2+10000000}) recvmmsg(r3, &(0x7f0000003b80)=[{{&(0x7f0000001a80)=@x25, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001b00)=""/29, 0x1d}], 0x1}, 0x10001}, {{&(0x7f0000001b80)=@hci, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1, &(0x7f0000002c40)=""/112, 0x70}, 0x40}, {{&(0x7f0000002cc0)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000003240)=[{&(0x7f0000002d40)=""/86, 0x56}, {&(0x7f0000002dc0)=""/134, 0x86}, {&(0x7f0000002e80)=""/119, 0x77}, {&(0x7f0000002f00)=""/241, 0xf1}, {&(0x7f0000003000)=""/254, 0xfe}, {&(0x7f0000003100)=""/85, 0x55}, {&(0x7f0000003180)=""/164, 0xa4}], 0x7, &(0x7f00000032c0)=""/198, 0xc6}, 0xfffffffc}, {{&(0x7f00000033c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003440)=""/79, 0x4f}, {&(0x7f00000034c0)=""/18, 0x12}], 0x2, &(0x7f0000003540)=""/100, 0x64}, 0xe5}, {{&(0x7f00000035c0)=@hci, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003640)=""/187, 0xbb}, {&(0x7f0000003700)=""/247, 0xf7}, {&(0x7f0000003800)=""/56, 0x38}, {&(0x7f0000003840)=""/63, 0x3f}, {&(0x7f0000003880)=""/44, 0x2c}], 0x5, &(0x7f0000003940)=""/16, 0x10}, 0x7}, {{&(0x7f0000003980)=@in, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003a00)=""/23, 0x17}], 0x1, &(0x7f0000003a80)=""/246, 0xf6}, 0x1}], 0x6, 0x1, &(0x7f0000003d00)={0x0, 0x3938700}) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x9, @remote, 0x101}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x404a004) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000840)={0xa, 0x0, 0x5, @remote, 0xff, 0x4}, 0x20) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x584}], 0x1, 0x0, 0x0, 0x2bc0}, 0x0) 00:41:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684c", 0xa9}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000800140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffffda}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4a}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x3) unshare(0x20000) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sched_setattr(0x0, &(0x7f0000000580)={0xa, 0x1, 0x40, 0x800, 0xfffe, 0x7, 0x1ff, 0x10001, 0x4}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000040)={0x38, 0x5, 0x4, 0x4, 0x800, 0x56cd, 0x6, 0x6983, 0x9, 0x400}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000680)={0x38, 0x2, 0x2, 0x0, 0x6, 0xfffffffffffffff7, 0x10000, 0x80, 0x80000000, 0x7}, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000400)=0xbf3, 0xffffffffffffffff, 0x0, 0x7, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000200)={0x38, 0x0, 0x24, 0x7ff, 0x4, 0x3, 0x4, 0x0, 0x4, 0x6}, 0x0) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x8, 0x81, 0x3, 0x0, 0x6, 0x480, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72e40a9d, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x8000, 0x0, 0x2, 0x1, 0x7, 0xfff, 0x7f, 0x0, 0xff, 0x0, 0xfffffffd}, r3, 0xa, r0, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000900)=[{&(0x7f0000000980)="d79fa4df1a304671825a0978173e25fe8b615fbf8ac6e3bab470a448c5e8e9a5ddeb0dd20b7667d3f9d06a3ed1ee0e00a4554d507f02f66cd2af749358f59047652547b54bd6ee4c71d9f5a5dad810ecf1f9744911df5721fb131e341bc4d16ac5a878c781ed2db332c3fc111c3ed0c90f76b1daea82a8b158a4007011e411b1e60a6a518def87e72690d2630361c140936ac78371f10d786d86f044f08b2132a49c8364b917f67a81f9d3f7dcaba7f21d1cfe35efeef7878b5d557f1a43beee73564800fa848ae33765d16e07c4b182acf66994bc7705e1196502e51cfbce12edc2e1a4df", 0xe5}, {&(0x7f0000000480)="ced514212f33ac214fce31132f5381b76a698e5745a2807fd1a8200fe1ae77b62f2f6e892119ce85440f4d5211bed31a7403cbc82e8355484536c33f47b8fc4f32b5a95a8cd21691", 0x48}, {&(0x7f0000000500)="7323f972512f650878c21a858a1d60b2", 0x10}, {&(0x7f0000000780)="4dd77c162802fa3a03eb2ebfbd474f2dac4ba0497285b286b64376ccb321040ae5f2b7d891d3e1991e80b0ccb7cd6c329b30f25e55922c2252aac78d8050fd282b93281442a97b19a67b3621b164110a13809357c8889d217c23999f624c6ec9a1071511b1039a4520e63bd2a0e2c758286fc0b0d6a6d13d8455c7365d6c3a14401a342f9d126b3e008527bcdfe992b18b226052f1125e78ba0263f045411666cb334bb081cca0cf55b0e2e54494e7f6654b07ee039453dddd57bce91636e0630c9baefd3910660361602ec99cd499725de81a254c2488cd33c539804e8be333b83c33ec2a6d58c749", 0xe9}, {&(0x7f0000000880)="eabc1fe9a8d6", 0x6}], 0x5, 0x0, 0x7) ftruncate(r0, 0x6) migrate_pages(0x0, 0x5, &(0x7f0000000140)=0x7fff, &(0x7f0000000540)=0x1) setns(r1, 0x20000) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000180), &(0x7f0000000440)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000240)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffffff600000000b91e1d14000001b90000000000000000000000000000000000000000000000000000000000000000010000010100000100086ad2226fc60f5184be60ffb1", 0x8e, 0x8000}, {&(0x7f0000000c80)="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", 0x39b, 0x87fe}, {&(0x7f0000000100)="22001701000020000117004000000000080078092ddf32206572041fcd9d5ae048aa3e140b2a3a0802", 0x29, 0x73543525}, {&(0x7f0000000300)="d06fce691c2fc84d5315c8e82a9df311c6b799c20582efcefa4cc76fa6ac38e7951dbae2ad617ecbf5987a425666da8567dbd06ad2fd0d394451f67e302697b4cf", 0x41, 0x4}, {&(0x7f0000000ac0)="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", 0xfd, 0xf2a6}], 0x0, &(0x7f00000006c0)={[], [{@uid_eq={'uid', 0x3d, r4}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000080)) 00:41:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffff6}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000f00140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffffe}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x78) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x2000, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000001100)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x9, 0xa, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x9}, @map={0x18, 0x1, 0x1, 0x0, r0}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xf4, &(0x7f0000000f40)=""/244, 0x40f00, 0x15, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x3, 0x0, 0xae, 0x8}, 0x10}, 0x78) 00:41:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39006000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684c", 0xa9}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000003140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x8000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:51 executing program 3: unshare(0x20000400) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x0, 0x3938700}, {r3, r4+10000000}}, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffc0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r5, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r5, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}}, &(0x7f0000000100)) 00:41:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x80000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xedc000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="3900c00e140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x7ffffffffffff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:52 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xe000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="3900000f140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684c", 0xa9}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x40000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000025d6790dc9995c0b0000000000000000000000000000000000000000000000000000000000000000000000000000000000b6e61e03ea1cae226fab442214627b143591db12ae69f66c7461dcd02d2f4eeb5588e3d7df065a629d9b6fac7bed6b6a2434776a1646387c213e8fe9ca360d8d37cd5ac053bfc95f304dd019ade298c4f0cc35b9f981619c8686050f0800d1fef43d7bb85fda535f6937d8e3"], 0x78) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) preadv(r3, &(0x7f0000000600)=[{&(0x7f0000000480)=""/85, 0x55}, {&(0x7f0000000500)=""/48, 0x30}, {&(0x7f0000000540)=""/48, 0x30}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000580)=""/91, 0x5b}], 0x5, 0x7, 0x9) r7 = accept4$nfc_llcp(r3, &(0x7f0000000300), &(0x7f0000000040)=0x60, 0x1000) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r9 = socket$l2tp(0x2, 0x2, 0x73) fsync(r9) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000059b00)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000059d00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000059f00)={0xffffffff, [{r5, r6}, {0x0, r6}, {0x0, r6}, {}, {r4, r6}, {}, {r4, r6}, {0x0, r6}, {r4}, {}, {}, {r5, r6}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r4}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r5, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5, r6}, {}, {}, {r5, r6}, {r5, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {}, {r4, r6}, {}, {r5}, {r5, r6}, {}, {r4}, {}, {}, {r4, r6}, {0x0, r6}, {r5}, {r5}, {0x0, r6}, {r5, r6}, {}, {}, {}, {0x0, r6}, {r4}, {r4, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r4}, {}, {0x0, r6}, {}, {r4, r6}, {r5, r6}, {}, {r4}, {r4}, {r4}, {r5, r6}, {r4, r6}, {}, {r4, r6}, {0x0, r6}, {r5}, {r5}, {r5}, {}, {r5, r6}, {0x0, r6}, {r4, r6}, {r4}, {r5, r6}, {}, {r5}, {r4}, {r5, r6}, {}, {r5, r6}, {r4}, {r5, r6}, {}, {r4}, {}, {r5}, {0x0, r6}, {r4, r6}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r4, r6}, {0x0, r6}, {r4, r6}, {r5}, {r5, r6}, {r4}, {}, {r4}, {}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {}, {r4, r6}, {}, {}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r5, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {r5}, {r5}, {r5}, {r4, r6}, {}, {r5}, {r4}, {r4, r6}, {r4, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {r4, r6}, {}, {r4}, {r4, r6}, {r4}, {}, {r4}, {r4}, {}, {0x0, r6}, {r5, r6}, {}, {0x0, r6}, {r5}, {}, {}, {0x0, r6}, {r5, r6}, {}, {0x0, r6}, {r5, r6}, {r4}, {r4}, {0x0, r6}, {r5, r6}, {r5}, {r5, r6}, {}, {}, {r4, r6}, {0x0, r6}, {r5}, {r4, r6}, {r4}, {r4}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5, r6}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {r4}, {r5}, {r4}, {r5}, {r5}, {}, {r5}, {}, {r5, r6}, {r4}, {}, {}, {r4, r6}, {r4}, {}, {r4}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {r10, r11}], 0x0, "085433405076e6"}) 00:41:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39004b4b140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd", 0xac}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x100000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000070601010000000000000000000000000500010006000000fbe70491908e501b462c07943688bb5bc1a181da84e890335286c36b495fe9fdca00769281d377c72fab995ce13deb50720f8e4f135c20ffcfd41543f9179c33b30b507931e9106b92c80501fc0f39e38d1682"], 0x1c}}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000700)={0x1, 0xfffffffffffffff7, 0x6, 0x0, 0x0, [{{r0}, 0x400}, {{}, 0x47431bf9}, {{}, 0x3ff}, {{}, 0xfffffffffffffffa}, {{r1}, 0x7f}, {{r2}, 0xd4e}]}) r3 = socket(0x10, 0x802, 0x0) recvmsg(r3, &(0x7f0000000100)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/252, 0xfc}], 0x1, &(0x7f0000000340)=""/136, 0x88}, 0x10100) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000480)={0x0, @can={0x1d, r4}, @xdp={0x2c, 0x8, r6, 0x1f}, @vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0, 0x0, 0x0, 0x9f, &(0x7f0000000180)='macvlan0\x00', 0x653, 0xc0d8}) sendmsg$nl_route_sched(r5, &(0x7f00000005c0)={&(0x7f0000000140), 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@newtclass={0x78, 0x28, 0x400, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xb, 0xd}, {0x8}, {0x8, 0xa}}, [@tclass_kind_options=@c_cbs={0x8}, @TCA_RATE={0x6, 0x5, {0x7, 0xff}}, @tclass_kind_options=@c_qfq={{0x8}, {0x34, 0x2, [@TCA_QFQ_LMAX={0x8}, @TCA_QFQ_LMAX={0x8, 0x2, 0xfffffffb}, @TCA_QFQ_LMAX={0x8}, @TCA_QFQ_LMAX={0x8, 0x2, 0x1}, @TCA_QFQ_LMAX={0x8}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0x5658}]}}, @TCA_RATE={0x6, 0x5, {0x7, 0x4}}]}, 0x78}}, 0x4041) shutdown(0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) fcntl$setsig(r7, 0xa, 0x28) 00:41:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2500}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0xf}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x6, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c4a, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3800000, 0x1000, &(0x7f0000000100)=""/4096, 0x40f00, 0x12, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000001100)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001140)={0x5, 0xf, 0x10000, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) 00:41:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000060140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x10e000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:54 executing program 3: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)='a', 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x209}}], 0x30}], 0x1, 0x0) 00:41:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3403}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x200000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000ec0140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:54 executing program 3: setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x8) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3, 0xff, 0x0, 0x3, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, @perf_config_ext={0x10001, 0x7}, 0x49000, 0x5, 0x0, 0x4, 0xf7a6, 0x20, 0x2, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000280), 0xc, 0x0}, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @empty}, &(0x7f0000000200)=0xc) r3 = socket(0x11, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@dellink={0x44, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x0, 0x8}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_EVENT={0x8, 0x2c, 0x5}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x8}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0xc, r5, 0x1, 0x0, 0x6, @remote}, 0x14) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=@newtaction={0xa358, 0x30, 0x200, 0x70bd26, 0x25dfdbfc, {}, [{0x12c, 0x1, [@m_ipt={0x128, 0x9, 0x0, 0x0, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0xab, 0x6, {0xa02c, 'mangle\x00', 0x0, 0x2a, "6dcd88c5e7c39e70930e333b714de126b598dd3ed9abaafa3238f496bedabea0d974e6aa7fd89fb3174a9c5987ed90846962d3d52c900dd283ac9f5006f89ab9b751705be693018e86f9b597cb55e5ec4f7104f232e63d45a93a727f188d96c7e113e99cff76a636a72b20da921cd6dfbd0ebfcc16035a55e22b4291e4d53b2aa5"}}]}, {0x49, 0x6, "8ccfa08a9bd438a6fe7b9269e860086ec391b601654b9901cb9f9e3752144d99ceb1da5609d91f6c925707e01868cda19ab827e9fcf893c9bb4922e9f7a4882dae4a068182"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, {0x20f4, 0x1, [@m_csum={0x44, 0x1f, 0x0, 0x0, {{0x9}, {0x4}, {0x18, 0x6, "4e0440bae63933f9b6603e1d218e29a87ad1eee3"}, {0xc}, {0xc, 0x8, {0x3}}}}, @m_pedit={0x1e8c, 0x10, 0x0, 0x0, {{0xa}, {0xe60, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x24, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x1, 0x6, 0x4, 0x7ff, 0x8001}, 0x0, 0x80, [{0x9, 0x80000001, 0x3, 0xffff, 0xccf, 0x9}]}, [{0x59, 0x1ff, 0x5, 0x6, 0x9, 0x50}, {0x7985, 0x6, 0x8, 0x400, 0x8, 0x7}, {0xe6, 0x8000, 0xff, 0x2f8e, 0x5, 0x3}, {0x0, 0x4, 0x6, 0x10000, 0x4, 0x8}, {0x4c, 0xa0, 0x1, 0x7fffffff, 0x0, 0xffffffc1}, {0x1ff, 0x401, 0x5, 0x8, 0x3, 0x6}, {0x5, 0x80000001, 0xfffffff8, 0x1, 0xfffffffa, 0x3}, {0x42, 0x4, 0x2, 0x8000, 0xfff, 0x1000}, {0x7f, 0x80, 0x6, 0x2, 0x200, 0x3}, {0x9, 0x80000001, 0x401, 0x6, 0x6, 0x4}, {0x7, 0x6, 0x200, 0x95f, 0x200, 0x1f}, {0x1, 0x7, 0x8000, 0x400, 0x7, 0xffffffff}, {0x3, 0x401, 0x8001, 0x1, 0x3, 0x1}, {0x5, 0x5, 0x5, 0x3, 0x3}, {0x2, 0x7f, 0x1, 0x9, 0x80000001, 0x3}, {0xffff, 0x6, 0x400, 0x1, 0x36c, 0xdc}, {0x6, 0x9, 0x7fff, 0x9, 0x0, 0x80}, {0x8, 0x9, 0x10000, 0x8, 0x4, 0x9}, {0x2, 0x2, 0x3, 0x10000, 0x6e, 0x9}, {0x0, 0x2, 0x7, 0x2, 0x101, 0x3}, {0x6, 0x1f, 0x5a5f, 0x3, 0xa742, 0x3}, {0x3, 0x200, 0x5, 0x7fffffff, 0xe90, 0x7}, {0x1379e0, 0x5, 0x3, 0x40, 0x7f, 0x7ff}, {0x30, 0x8, 0x100, 0x7fffffff, 0x0, 0x6}, {0x7, 0x8001, 0x6, 0x1, 0x9, 0x200}, {0x20, 0x0, 0x33a, 0x4, 0x0, 0x6}, {0x7fffffff, 0x4, 0x3386d4fb, 0x0, 0x2, 0x1}, {0x800, 0x7fffffff, 0x5, 0x61d, 0x4, 0x9}, {0x7f, 0x0, 0x7, 0x3072, 0xffffff32, 0x7}, {0x8, 0x32f3, 0x7f, 0x9, 0x0, 0x2}, {0x4, 0x8, 0x1, 0x400, 0x1000000, 0x7}, {0xb582, 0x401, 0x1000, 0x3, 0xf453, 0x85e}, {0x101, 0x8001, 0x9, 0x1, 0x80000001, 0xffffffff}, {0x5, 0x7fff, 0x100, 0x5eaa, 0x9, 0x5}, {0x8, 0x5, 0x8ab6dfb, 0x6, 0xe749, 0xcd}, {0x2, 0x0, 0x2, 0x3, 0xa76, 0x6}, {0x7197, 0x4, 0x3, 0x21, 0x100, 0x1}, {0x5, 0xff, 0x875, 0x8, 0xffff8f6f, 0x3}, {0x0, 0x10001, 0x1, 0x7fffffff, 0x6b0, 0x4}, {0x5, 0x6, 0x6, 0x800, 0x7, 0xfffffc30}, {0x100, 0x400, 0x8, 0xf63f, 0x5, 0xd}, {0x6, 0x2, 0x4, 0x1000, 0x8, 0x6}, {0x0, 0x2, 0xffffffff, 0x3, 0x0, 0x9}, {0xf8, 0x5, 0x2, 0x8299, 0x1}, {0x8407, 0x4, 0x9, 0x5, 0x5, 0x3}, {0x9, 0x8001, 0x7f, 0xa3f5, 0xffff, 0x6}, {0x1, 0x391, 0x5, 0xffffffff, 0x2, 0xffffffff}, {0xff, 0x4, 0x6b0, 0x9, 0x8, 0x4}, {0xd3, 0x100, 0x7, 0x8, 0x5}, {0x1, 0x81, 0x2, 0xffffddb4, 0x8}, {0x6, 0x4, 0x10b, 0x4, 0x62b}, {0x7a, 0x1, 0x7ff, 0xffff8001, 0x32, 0x9}, {0x1, 0x3, 0x9, 0xf88, 0x85, 0x9}, {0x20, 0x6, 0x56ae8ab7, 0x5, 0x8001, 0x3cfc}, {0x7ff, 0x4, 0x101, 0x8, 0xffffffe0, 0x7d}, {0x1615216b, 0x101, 0x84, 0x2, 0x101, 0x7f}, {0x4, 0x8, 0xfffffffb, 0x9, 0x200, 0x4}, {0x0, 0xfffffeff, 0xffff, 0xd7, 0x4, 0x4}, {0xff, 0x5, 0x3, 0xabe8, 0x3, 0x4}, {0x4, 0x1ff, 0x1, 0x5, 0x3, 0x6}, {0x4, 0x70c, 0x3, 0x8, 0x49d, 0xffffffff}, {0xffff, 0x0, 0xa30, 0xb119, 0x6}, {0x5, 0x4, 0xfffffff7, 0x1ff, 0x81, 0xfffeffff}, {0x4, 0x3f, 0xc6c4870, 0x20, 0x8, 0x9f9d23dc}, {0x0, 0xf9, 0x9, 0x3ff, 0x9be, 0x401}, {0x9, 0xfffffffb, 0x9, 0x9, 0x3, 0xafa}, {0xffffffff, 0x3f, 0x81, 0x3, 0x3, 0x7}, {0x2, 0x8, 0x5, 0x0, 0x80000001}, {0x80000000, 0x9c, 0x9, 0xfff, 0x4, 0x40}, {0x0, 0x2, 0x3, 0x20, 0x1f, 0x100}, {0x6, 0x3, 0x9, 0x5, 0x20, 0xa5c}, {0x100, 0xa41, 0x1ff, 0xbdaa, 0x2, 0x6}, {0x1, 0x5, 0x1, 0x7, 0x3, 0x5}, {0x2, 0x4, 0x6, 0x0, 0x97d, 0x200}, {0x100, 0x2, 0x2, 0x5, 0x3, 0x5}, {0x81, 0x69bae00f, 0x978b7662, 0x6, 0x1000, 0x6}, {0x72d, 0x8, 0x6, 0xffffffff, 0x2, 0x800}, {0x2, 0x2, 0x1, 0x3, 0xffffff84, 0x7f}, {0x2, 0x1f, 0x4fe, 0x2, 0x80000001, 0x800}, {0xfffffffd, 0x8, 0x7ff, 0x80, 0x7ff, 0x6}, {0x9, 0xffffffff, 0x7f, 0x1, 0x8, 0x10001}, {0xffffffff, 0xf247, 0x40, 0x3, 0x74, 0xff}, {0x99, 0x3f, 0x7fffffff, 0x0, 0x8, 0x6}, {0x6, 0x4, 0x1000, 0x0, 0x3, 0x2}, {0x5, 0x4, 0x3, 0x0, 0x7fffffff, 0x5}, {0x5, 0x5, 0x7ff, 0x9, 0xffffffc1, 0x1}, {0x3efc, 0x7c68, 0xf5, 0xfc7, 0x80000000, 0x5b5c}, {0x1, 0x561, 0x6, 0x2000000, 0xffff, 0x5}, {0x8, 0x3000000, 0x401, 0x8000, 0x5, 0x1}, {0x0, 0x0, 0x1f, 0x100, 0xb6e, 0x3c}, {0x7, 0xfffffff7, 0x68, 0x400, 0x76f, 0x7}, {0x6, 0x41, 0x0, 0x5, 0x1, 0x7fff}, {0x3, 0x8000, 0x401, 0x20, 0x7}, {0x1, 0x5, 0x9, 0x75, 0x1, 0x7fff}, {0x80, 0x1ff, 0x401, 0x7ff, 0x6833d0e6, 0x5}, {0x0, 0x2, 0xffffffff, 0x3, 0x1000, 0x5}, {0x9715, 0x3ff, 0x5, 0xfffffffc, 0x6}, {0x2480, 0x8, 0x6, 0x9, 0xffffe000, 0x7}, {0x8, 0x33, 0xefa8, 0x9, 0x8001, 0xfffffff7}, {0x5, 0x9, 0x6, 0x1, 0xffffff81, 0x2}, {0x2, 0xfffeffff, 0x7fffffff, 0x1ff, 0xfff, 0x7}, {0x8, 0x9, 0x9, 0x0, 0x0, 0x6}, {0x7, 0x6, 0x80, 0xffff0f4f, 0x40, 0xb7dd}, {0x800, 0xab1, 0x7, 0xffff, 0x2, 0x3f}, {0x8001, 0x1, 0xcfd, 0x8, 0x0, 0x800}, {0x943e, 0x3, 0x80000001, 0x8f, 0x1, 0x1f}, {0x0, 0x9, 0x5, 0x7, 0x9, 0x8}, {0x7ff, 0x8001, 0x7, 0x0, 0x80000000, 0x9}, {0x80000000, 0xa, 0x6, 0x8, 0x200, 0x5}, {0x24d, 0x2, 0x0, 0x5, 0x24, 0x6}, {0x6, 0x1, 0x3, 0x2, 0x1ac, 0xffffffff}, {0x4, 0xffff1ca2, 0x7, 0x9, 0xf7, 0x800}, {0xfffffffc, 0xfffffff7, 0x10001, 0x3, 0x7}, {0x0, 0x7, 0x3, 0x40, 0x5a, 0x6}, {0x9, 0x5, 0x0, 0x5, 0x6, 0x81}, {0x46ae, 0xff, 0x8000, 0x6, 0x2, 0x7}, {0x9, 0x1, 0x3ff, 0x45, 0x3, 0x7}, {0x1, 0x5, 0x8, 0x9, 0xa68d}, {0x400, 0x1000, 0x7, 0x1, 0xfffffff8, 0x1}, {0x1000, 0x4, 0x7516, 0xfffffffd, 0x7, 0x20}, {0x3, 0x6, 0x1, 0x1, 0x5, 0x21ef}, {0x2800, 0x3, 0x7ff, 0x6, 0xffff8001}, {0x8, 0x7, 0x562e, 0xffff, 0x8, 0x100}, {0xffffffff, 0x0, 0x7fff, 0x369, 0x68, 0x100}, {0x20, 0x4, 0x20, 0x7, 0xfffffffc, 0x7f}, {0x4, 0x100, 0xffffffbb, 0x5, 0xfa97, 0x1}, {0x42, 0x1ff, 0x5, 0x6, 0x9, 0x2}, {0x7fff, 0x3, 0x5, 0x6a7, 0xffffffe4, 0x80}], [{0x4}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x5}, {0x2, 0x1}, {0x1}, {0x4}, {0x4, 0x1}, {0x6, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x5}, {}, {0x6, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x3}, {}, {0x5, 0x1}, {0x1}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x5}, {0x2, 0x1}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x1}, {0x1}, {0x1}, {0x4}, {}, {0x5}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x5}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x1}, {0x2}, {0x1}, {0x5, 0x1}, {0x2}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x3}, {0x2}, {}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x2}, {0x4}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {}, {0x3}, {}, {0x3, 0x1}]}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_mirred={0x12c, 0xb, 0x0, 0x0, {{0xb}, {0xe4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0xffffffff, 0x6, 0x10000000, 0x1000, 0x10000}, 0x2, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x8, 0x7, 0x3, 0x81, 0x9}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1ff, 0x7, 0x7, 0x7, 0x81}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x80, 0x1, 0x1, 0x6, 0x6}, 0x1, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x497d, 0x0, 0x5, 0x122fe0}, 0x4, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x480, 0x2, 0x3, 0x8001}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xf3f, 0x8, 0xffffffffffffffff, 0x20, 0x1}, 0x4}}]}, {0x1d, 0x6, "2b5cf53c8232b211c3eb5d70675273ef67769906cf78fb3da4"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mpls={0xf4, 0x10, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0xe105}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x7, 0x1, 0xffffffffffffffff, 0x3, 0x1}, 0x1}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x9b, 0x6, "4d72f93fc6681b425d1a29cf5f5e6872c29e9979e29a9db383a36986fce7729364b18b305704155a54af06bfba40e2b18ecfcdc44a3b1058924b2593d3210448a7132ce566b32615bf6f8a546225d77f88cc2c676f5ad39b47c737d00b53994bb67bdb981de4faead00b98ab85223802be197892292e75cd7a5b3797f01d4bce1492793e5579c3a0e6195c063344b53e5a22a306d6af9c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, {0x59d8, 0x1, [@m_pedit={0x59d4, 0x11, 0x0, 0x0, {{0xa}, {0x5968, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe98, 0x4, {{{0x5, 0x84, 0x7, 0x4}, 0xee, 0x7f, [{0x9, 0x0, 0x7fff, 0x77, 0x7fffffff, 0x6404}, {0x2, 0x3a3, 0x506e, 0x8, 0xffffffff, 0xc13}, {0x3f, 0x9, 0x3, 0x4, 0x2, 0x400}, {0x0, 0x0, 0x7, 0x1, 0xc919, 0x5}, {0x7, 0x87d4, 0x7ff, 0x1, 0x80000001, 0xffff0000}]}, [{0xffff, 0x0, 0x5202, 0x5, 0xfff, 0x9}, {0x1, 0x2, 0x97, 0x4, 0xe5ab, 0x27bb}, {0x7fffffff, 0x7, 0x0, 0x0, 0x7, 0x8000}, {0x5, 0x4, 0xce2d, 0x80, 0xab}, {0xffffffff, 0x4, 0x7, 0x7, 0x20, 0x1}, {0x8, 0x7, 0xff, 0x7ff, 0x1481, 0x8}, {0x2, 0x40, 0x5, 0x3, 0x653, 0x2}, {0x80000001, 0xfff, 0x2b5, 0x3b08, 0x7, 0x4}, {0x80000001, 0xc3, 0x4, 0x7f, 0x5, 0x9}, {0x1, 0x8, 0x75b, 0x1}, {0x0, 0x101, 0x0, 0x7, 0x7fff, 0xfff}, {0x336, 0x9, 0x6, 0x8, 0x9, 0x523}, {0xfffffff8, 0x800, 0x7e, 0x7fff, 0xfffffffc, 0x8001}, {0x9, 0x1a76, 0x0, 0x1, 0x62, 0x1}, {0x7, 0x1, 0xd00, 0xff, 0x4, 0x4}, {0x1f, 0xa0, 0x1f, 0xcb, 0xffff, 0x200}, {0x2, 0x1b, 0x6c16, 0x2, 0x9, 0x1}, {0x7ff, 0x200, 0x9, 0x4, 0x8, 0x400}, {0x6, 0x81, 0x7, 0xa93, 0xcd}, {0xffff, 0x7fffffff, 0xfff, 0x8, 0x3, 0xffff9b23}, {0x9, 0x5, 0xffffff6c, 0xff, 0x101, 0x3}, {0x1, 0x4, 0x8000, 0x0, 0x5}, {0x4, 0x0, 0x4f, 0x8, 0x1, 0x6f}, {0x8, 0x2, 0x6, 0x23, 0xfffffffe, 0x8001}, {0xfffffff8, 0x10001, 0x800, 0xa00a, 0x400, 0x200}, {0x3, 0x45bd, 0x5, 0x4524, 0x80000001, 0x2}, {0x8000, 0xffff, 0x2, 0x5, 0x0, 0xffffc128}, {0x80000000, 0x7f, 0x47e0, 0x18f44, 0x7, 0x8}, {0x7, 0x80000001, 0x7a, 0x8, 0x81, 0x2}, {0x8a, 0x8000, 0x71, 0xfffffffb, 0x7, 0x80000000}, {0x80, 0x6b1d, 0x3f, 0x8, 0x4, 0x9af}, {0x7, 0x5, 0x5, 0x9, 0xf06, 0x1}, {0x20, 0x8, 0x6, 0x3ff, 0x0, 0xce2a}, {0x8, 0x9, 0x80, 0x9b10, 0x401, 0x10000}, {0x9, 0x4, 0xc5f, 0x1, 0x8, 0x7}, {0x9, 0xff, 0x1, 0x93, 0xfffffff9, 0x80}, {0x1c8, 0x6, 0x3f, 0x9, 0x0, 0x5}, {0x7, 0xffff8000, 0x7ff, 0x200, 0x6, 0xffffffff}, {0x5, 0x6, 0x6, 0x5, 0x20, 0x5}, {0x7fff, 0xffffffff, 0x705a, 0x5c, 0x3ff, 0x5}, {0x10001, 0x226e, 0x47b, 0xfffffffb, 0x9, 0x1f}, {0x81, 0x7fffffff, 0x7, 0x1, 0x3, 0x4}, {0x7, 0x4, 0x7, 0x3, 0x95, 0x7}, {0xfff, 0x3, 0x6, 0x3f, 0x4, 0x40}, {0x9, 0x2, 0x7, 0x802000, 0x200}, {0xfd, 0x6, 0xb7, 0x6f, 0x6, 0x5}, {0x1f, 0x4, 0x40, 0x0, 0x2, 0x6}, {0x100, 0xfff, 0x8, 0x4ab2, 0xc0000000, 0x5}, {0x0, 0x7, 0x80000001, 0x3, 0xb019db2, 0x7}, {0x8, 0x8, 0x4, 0x4, 0x8, 0x40}, {0x3, 0x5, 0x10000, 0x9, 0x3ff, 0x400}, {0xf2f4, 0x635, 0x1fffe00, 0x6b2, 0x3ff, 0x9}, {0x0, 0x6, 0x4, 0x7, 0x8, 0x7fff}, {0x1, 0x1, 0x0, 0x4, 0x75, 0x40000000}, {0x8, 0xf211, 0x4, 0x7, 0xffffff14, 0x3ff}, {0x3, 0x6, 0x0, 0x3a58, 0xdd8c8f3, 0x5}, {0xb9, 0x101, 0xfffffffa, 0x9, 0x0, 0xd1be}, {0x6, 0x9, 0x1, 0x1c60, 0x9, 0x8001}, {0x5, 0x6, 0x52, 0x101, 0x4, 0x5}, {0xffffffff, 0xae1, 0x81, 0x6, 0x1ff, 0x80}, {0x7fff, 0x8, 0x8, 0xb61, 0x20, 0x4}, {0x400000, 0x9, 0x10000, 0x77, 0x5, 0x4a8}, {0x7ff, 0x10000, 0x8, 0x2, 0x7ff, 0x8000}, {0x1, 0x5, 0x7f, 0x4, 0x5, 0x6}, {0xc77, 0xb8, 0x10001, 0xd0, 0xff, 0x8}, {0x10, 0x400, 0x3, 0x8, 0x7, 0x1000}, {0x0, 0x401, 0x1ff, 0x8, 0x5, 0x8}, {0x4ece, 0x40000000, 0x10000, 0x7fff, 0x3, 0x3092}, {0x5, 0x7a6f73f7, 0x8, 0x3, 0x1}, {0xe4, 0x4, 0xfffffff7, 0x9, 0x80, 0x3}, {0x100, 0x1ff, 0xffffffff, 0x1, 0x7, 0x1}, {0xffffffff, 0xffff08f2, 0x6, 0x3, 0x4, 0x4}, {0x13a, 0x10000, 0x1, 0x3, 0x0, 0x9}, {0x0, 0x3ff, 0x6, 0xff60, 0x2, 0xfff}, {0x81, 0x101, 0xffffffc0, 0x1ff, 0x1, 0x1}, {0x9, 0x2d20, 0x0, 0x8001, 0x1, 0x3}, {0x7, 0x5, 0x8, 0x9, 0x10001, 0x8001}, {0xff, 0x1, 0x9, 0x2, 0xffffffff, 0x3}, {0x8, 0x2, 0x20, 0x4, 0x100, 0x7}, {0xffffffff, 0x1, 0x7, 0xfffffeff, 0x8, 0x9}, {0x6, 0x8000, 0x7, 0x0, 0x40, 0x40}, {0x6, 0x6, 0x400, 0x3ff, 0xc9c, 0x4}, {0x7, 0x81, 0x8, 0x38, 0x2, 0x1000}, {0x0, 0x4, 0x8, 0x4, 0x5, 0x7ff}, {0x81, 0x7, 0xe03, 0x5, 0x7, 0x10000}, {0x4, 0x200, 0x6, 0x4, 0x10000, 0x100}, {0x25, 0x400, 0x9, 0x4, 0x0, 0x2}, {0x7fff, 0x23, 0x3d, 0x101, 0x10001, 0xfff}, {0x1, 0x4, 0x2, 0x4, 0x0, 0x9}, {0x6, 0x1, 0x401, 0x7, 0xfff, 0xfffffffb}, {0x2, 0xffffffff, 0x8, 0xb3ea, 0x5, 0x5}, {0x3, 0x3, 0x7f, 0x2, 0x81, 0xe9}, {0x7, 0x5, 0xffffffff, 0x1, 0x14, 0x20}, {0x6924bf2e, 0x5, 0x2, 0x9, 0x1, 0x2}, {0x1000, 0x7, 0xfffffffb, 0x3, 0x400, 0x3f}, {0xaba8, 0xda7, 0x2, 0x5, 0x3f}, {0x7fff, 0x7f, 0x1000, 0xeb6, 0xa87e, 0xdd}, {0xffff, 0x6, 0x6, 0x1, 0x8001, 0x90000}, {0x1, 0x80000001, 0x1bcc, 0x7fffffff, 0x2, 0x7}, {0x5, 0x4, 0xffff, 0x800, 0x20, 0x7f}, {0x4, 0x80000001, 0x100, 0xfffffc1f, 0x7ff, 0x10000}, {0xff, 0x3, 0x9, 0x80000000, 0x7f, 0x3}, {0x100, 0xfd7, 0x7fff, 0xf0, 0xde9, 0x6}, {0x5, 0xa0, 0x641d, 0x5, 0x4, 0x984f}, {0x1, 0x2, 0x4, 0x100, 0x3, 0x5}, {0x3, 0x1, 0x4, 0x4, 0x1, 0x80000001}, {0x4852, 0x1, 0xffff4df4, 0x6514, 0x1, 0x7fff}, {0xffff, 0x7, 0x9, 0x226a, 0x0, 0x10000}, {0x28d7, 0x6, 0x7, 0x1, 0x59e, 0xa000}, {0x3, 0x20, 0x0, 0x8, 0x401, 0x7}, {0x8000, 0x427, 0xfffffffd, 0x200, 0x2, 0x1000}, {0x5, 0x7, 0x40000000, 0x9, 0xfc, 0x7}, {0x5, 0x1, 0x0, 0x7, 0x80000001, 0x7}, {0xf8000000, 0x30d, 0xfff, 0x7, 0x401, 0xd95e}, {0xfffffe00, 0x1, 0xfffffffa, 0x0, 0x9, 0x7f}, {0x8, 0xe9, 0x3f, 0x2, 0x100, 0x8}, {0x45a, 0x5be, 0x1c3, 0x3, 0x3f, 0x6}, {0xe93a, 0x1, 0x1000, 0x9, 0x100, 0x7fff}, {0x0, 0x4, 0x5, 0x7, 0x4, 0x8a8d}, {0x2, 0xe9, 0xffffffff, 0x400, 0x0, 0x9}, {0x5, 0x3, 0x5690, 0xf5, 0x65a6, 0x7}, {0x8, 0x7fff, 0x5, 0xf4b8, 0xaee2, 0x2}, {0x800, 0x1, 0xef6, 0x1, 0x324f, 0x5}, {0x80000000, 0x200000, 0x58f2dbb1, 0x10000, 0x7f}, {0x5, 0x9, 0x4, 0x2, 0x6, 0x1}, {0x945, 0xad, 0x4f, 0x2, 0x80000000, 0x200}, {0x7, 0xd, 0x7, 0x68, 0x8, 0xffffffff}, {0x2, 0x534, 0x5, 0x8, 0x8, 0x3}], [{0x2}, {0x4}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x1}, {0x1}, {0x1}, {0x5, 0x1}, {0x2}, {0x3}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x3}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x4}, {0x2, 0x1}, {0x1}, {0x2, 0x3}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {}, {0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4, 0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {}, {0x4}, {0x5}, {0x5}, {0x5, 0x1}, {0x1}, {0x5}, {}, {0x1}, {0x1}, {}, {0x5, 0x1}, {0x4}, {}, {0x1, 0x1}, {0x5}, {0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x2}, {0x4, 0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x5}, {0x5}, {0x3}, {0x5}, {0x3, 0x1}, {0x2}, {0x3}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x3}, {0x5}, {0x2}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x3}, {0x4}, {0x1}, {0x4, 0x1}, {0x3}, {0xaa0a541e09acc261}, {}, {0x4}]}}, @TCA_PEDIT_KEYS_EX={0xe0, 0x5, 0x0, 0x1, [{0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe68, 0x2, {{{0xdec2, 0x80, 0x0, 0xbf90, 0x2}, 0x3, 0x4, [{0x7fff, 0x7, 0x6, 0x10000, 0x4, 0x3}, {0xffffffac, 0xfffffc01, 0x10001, 0x180000, 0x1ff, 0x6}, {0x0, 0x40, 0x6, 0x2, 0x0, 0xffffffff}]}, [{0x1, 0x8, 0x0, 0x81, 0x7, 0x6}, {0x8, 0x9, 0x8001, 0x3, 0x1}, {0x20, 0x2, 0x9, 0x0, 0x2, 0x6}, {0xfb9, 0x4, 0xffffffff, 0x2a, 0x8ead, 0x8}, {0x8000, 0x101, 0x2, 0x9, 0x5, 0x3}, {0x2, 0x20000000, 0x401, 0x9, 0xf3, 0x7}, {0x10001, 0x8, 0x5, 0x3, 0x1e, 0x8}, {0x6, 0x3, 0x3, 0x0, 0x8, 0x3}, {0x8d1e, 0x400, 0x800, 0x7, 0x81, 0xbb6}, {0x5, 0xce, 0x2, 0x40, 0x22e5a875, 0x2}, {0xfffffffe, 0x6, 0x1, 0xfffffed1, 0x80000000, 0x21}, {0x4, 0x0, 0x2, 0xba1a, 0x2c8a, 0xac}, {0x3, 0xfffffff9, 0x9, 0xcb, 0x6ce, 0x1f}, {0x7f, 0x5c, 0x80000001, 0x200, 0x40, 0x5f}, {0x0, 0xcfd, 0x8000, 0x5, 0x2, 0x722}, {0x0, 0x28, 0x8, 0x4, 0xfffffffd, 0x5}, {0x1, 0x1f, 0x200, 0x7, 0x2}, {0x4, 0x2a, 0xb27f, 0x1, 0x2, 0x10001}, {0x3, 0x100, 0x4, 0x1, 0x8, 0x7fffffff}, {0x2, 0x7ff, 0x2, 0x5, 0x3f, 0x9c}, {0x5, 0x7f, 0x5572, 0x2, 0x2, 0x1}, {0x20, 0x5, 0xcf, 0x8, 0x7, 0x82}, {0x80000001, 0x200, 0x800, 0x3, 0x9, 0x200}, {0x1, 0x5, 0x5c, 0x39, 0x3, 0x3ec}, {0xa1d9, 0x0, 0x0, 0x2, 0x87, 0x8}, {0x0, 0x1f, 0x2, 0x1, 0x9, 0x3}, {0x1, 0x0, 0x2, 0x6, 0x8000, 0xffffff7f}, {0x7f, 0x7, 0x51eb645, 0x3, 0x7, 0x8}, {0x6, 0x7, 0x81, 0x5ee, 0x1, 0xfffeffff}, {0x3, 0x1, 0x8, 0x5, 0x6, 0x1f}, {0x7, 0x4, 0x9, 0x50f, 0x5, 0xfffffbff}, {0x8000, 0x3, 0x71, 0x0, 0x7fffffff, 0x10001}, {0x1, 0x4, 0x101, 0xffff, 0x7, 0x6}, {0x3, 0x7, 0x0, 0x1, 0x6056, 0x671b}, {0x2259, 0x7f, 0xb09, 0x100, 0x3, 0xcc8}, {0x3, 0x5, 0x9, 0x6, 0x100, 0x9}, {0x7, 0x4, 0x401, 0x5, 0x1, 0xc2}, {0x2, 0x5, 0x7, 0x8, 0x7, 0x5}, {0xba, 0x1000, 0x200, 0x101, 0xffff, 0x1}, {0x7, 0x40, 0x4, 0x401, 0x7fffffff}, {0x2, 0x96, 0x2b3, 0x8, 0x9, 0xcd0}, {0x5, 0x4087, 0x7fff, 0xfffffffc, 0x7, 0x1ff}, {0x9, 0xfffff800, 0x5, 0xffff, 0xffff6791, 0x80000000}, {0xffff, 0x400, 0x101, 0x7ff, 0x2, 0xffffffff}, {0x818, 0x1, 0x0, 0x2, 0x6, 0x7}, {0x1000, 0x2, 0x8, 0x2, 0x4, 0x200}, {0x6, 0x61, 0x200, 0x7e4, 0x0, 0x9}, {0x4, 0xfffffffd, 0x7, 0x2, 0x78f5, 0x62eb}, {0x4, 0x8, 0xffff, 0x4, 0x8}, {0x9, 0x9, 0x80000001, 0x9a, 0xf495}, {0x3, 0x8, 0x16, 0x80, 0x9, 0x2}, {0x1, 0x1, 0x0, 0x5, 0x8001, 0x5}, {0xa17, 0xfff, 0x5be, 0x9, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x8, 0x7, 0x6}, {0x6, 0x6918, 0x1, 0x7fff, 0x3, 0xa3d7}, {0x4, 0x10001, 0x1, 0x3e, 0x400, 0x80000000}, {0xd6, 0x1, 0xbf3e, 0x7ff, 0x9, 0x3}, {0x4, 0xfffffffa, 0x0, 0x1, 0x9, 0x4000}, {0x4, 0x20, 0x8, 0x3, 0x7fff, 0x7fffffff}, {0xff, 0x0, 0x0, 0x40, 0x384b3953, 0x2}, {0x6, 0x40, 0x5, 0x1000, 0x7ff, 0x6}, {0x4, 0x1, 0xfffff001, 0x0, 0x21, 0x2f60}, {0x5, 0x5, 0x5, 0x3575, 0x6, 0x8000}, {0xff2, 0x6e7, 0x7, 0x397c, 0x3ff, 0x3}, {0x9, 0x401, 0xcd9, 0x8, 0x0, 0x6}, {0x5, 0x7fffffff, 0xec, 0x8, 0x5, 0x5}, {0x0, 0x7, 0x7, 0x80, 0xe174, 0x12000}, {0x39, 0x1ff, 0x80, 0x400, 0x3, 0x9}, {0x9, 0x80000000, 0x0, 0x8, 0x8, 0xffffffff}, {0x400, 0x5, 0x5, 0x8, 0x7, 0x9}, {0x7fffffff, 0x4, 0xfffffffd, 0x3635, 0x20, 0x3}, {0x5, 0x4, 0x1, 0xffff, 0x1, 0x76}, {0x8, 0x4, 0x6, 0x100, 0x8, 0x2}, {0xf4bd, 0x4, 0x7f, 0x7, 0x9, 0xffffc05e}, {0x5, 0xaecf, 0x1, 0x7f, 0x1, 0x8}, {0x7f, 0x8, 0x5, 0x12, 0x5, 0x9}, {0x95, 0x35, 0x3f, 0x1, 0x7, 0xa39b}, {0x1, 0x4ab, 0x0, 0x2, 0x7, 0x3ff}, {0x7f, 0x6, 0x9a, 0x8, 0xfffffe01, 0x5}, {0x1, 0x100, 0x0, 0x1f, 0xffffffff, 0xfff}, {0x6, 0x2, 0x3ff, 0x7f, 0x5, 0x2}, {0xe6ab, 0x5, 0x6, 0x10000, 0x80000001, 0xffffffff}, {0xa536, 0x3, 0xffffffe0, 0x9, 0x4, 0xfff}, {0x1, 0x1, 0xff, 0xffffff9d, 0x1, 0x7}, {0x1, 0xffffffff, 0x20, 0x8000, 0xff, 0xe82}, {0x1, 0x2, 0x8, 0x4, 0x9, 0x6}, {0xb5, 0x3, 0x3, 0x1, 0xfffffff7, 0x7ff}, {0x80, 0x200, 0x8, 0x8, 0x3, 0x7fff}, {0x1, 0x7, 0x4, 0x2, 0x4, 0x3}, {0x9, 0x7ff, 0x6, 0x2, 0xfffffff9, 0x5}, {0x0, 0x9bb5, 0x4, 0xfffffe00, 0x694}, {0x7, 0x2, 0x8001, 0x1ff, 0x972, 0x7}, {0x9, 0x100, 0x10001, 0x9, 0x800, 0x9}, {0x10000, 0x101, 0x58e, 0x0, 0x0, 0x113b}, {0x7ff, 0x6, 0x8, 0x10000, 0xfff, 0x45}, {0x2, 0x164a, 0x81, 0x80000000, 0x5, 0xbb}, {0x1d984b1, 0x7f, 0x100, 0x10001, 0x7fffffff, 0x5}, {0x3, 0xfffffffd, 0xb1, 0x2, 0x3d45ca9f, 0x3f}, {0x1, 0x8, 0x5, 0xfffffffc, 0x1, 0x4}, {0xc, 0x8a1, 0x4, 0x1, 0x0, 0xfffffffe}, {0x3a4, 0x9, 0x5, 0x80000001, 0x9, 0x3f}, {0x1fc1, 0x0, 0x3, 0xfffff623, 0x5, 0x80000001}, {0x2, 0x2, 0x62, 0x7, 0x7, 0xac}, {0x61d9, 0x2, 0x7, 0x1ff, 0x0, 0x1ff}, {0x3, 0x1, 0x3, 0x9a0f, 0x2c, 0x2}, {0x7ff, 0x7, 0x32d, 0xfffffffc, 0x2, 0x4}, {0x8f, 0x5dfd56ae, 0xb80, 0x3, 0x2800000, 0x1}, {0x9, 0x169ed588, 0x6, 0x6, 0x800, 0x1}, {0x2, 0x1, 0x1, 0x57160e9, 0x1ff, 0x7}, {0x0, 0x4f386e5c, 0x1000, 0x4, 0x76, 0x5}, {0x80000001, 0x4, 0xecab, 0x80000000, 0x2a, 0x7}, {0x42, 0x47, 0x2, 0xffffffff, 0x1000, 0x7fff}, {0x15ad, 0x1f, 0x2802, 0x3, 0xfff, 0x3}, {0x9, 0x2e, 0x1f, 0x4b32, 0x9, 0x8700}, {0x80000001, 0x1262, 0x3, 0x4, 0x20, 0x2}, {0x1, 0x4, 0x5ef8, 0x9, 0x3, 0x7fff}, {0x10001, 0x20, 0x9, 0x6, 0x7, 0xff}, {0x1, 0x4, 0xffff, 0x6f0c, 0x20, 0x8}, {0x0, 0x8001, 0x4, 0x20, 0x81, 0x6f6c}, {0xfffff000, 0x401, 0x401, 0x7, 0x5, 0x9}, {0x7f, 0x1, 0x4, 0x4, 0x7, 0xc0}, {0x3, 0x6d, 0x3, 0x6, 0x10000, 0x9}, {0x7, 0x8, 0x3, 0xd3, 0x40, 0xffffffc1}, {0x8746, 0x8, 0x3, 0x29, 0x10001}, {0x16f7, 0x9, 0x1ff, 0xd860, 0x7fffffff, 0x4}, {0x3, 0x0, 0x7, 0x2, 0x40, 0x5}, {0xfa6b, 0x7fff, 0x1800000, 0xda, 0xa999, 0x101}, {0x5, 0x1, 0x0, 0x0, 0x8001, 0xfffffff7}], [{0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x1, 0x1}, {0x2}, {0x5}, {0x5}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x80efa6727855bfb6}, {0x3}, {0x2}, {0x2, 0x2}, {0x4}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x4}, {0x3}, {0x3}, {}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x6}, {0x5}, {0x2, 0x1}, {}, {0x0, 0x1}, {}, {0x4, 0x1}, {}, {0x0, 0x2}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x4}, {}, {0x3, 0x1}, {0x68bccb3e52c17e44}, {0x4, 0x1}, {0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x2}, {}, {}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0xe7e284eddf773ca2}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x5}, {0x5}, {0x2}, {0x4}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0xbfdbd2e0f2308cdb}, {0x0, 0x1}, {0x4}, {0x2}, {0x3}, {0x1}, {0x2}, {0x1}, {}, {0x5, 0x1}, {0x5}, {0x5}, {0x2}, {0x2, 0x1}, {0x3}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x5}, {0xe, 0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x3}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x2}, {0x3, 0x1}]}}, @TCA_PEDIT_PARMS={0xef8, 0x2, {{{0x81, 0x3, 0x1, 0xffffffff, 0x1}, 0x3e, 0x64, [{0x401, 0x876, 0x1000, 0x2, 0x0, 0x10000}, {0x10000, 0x9, 0xd1c3, 0x20, 0x8000, 0xab}, {0x5, 0x7, 0x7fff, 0x9, 0x1, 0x9085}, {0xf59, 0x0, 0x7, 0x9, 0x2, 0xd34e}, {0x59, 0x7, 0x81, 0x7fff, 0x400, 0x4}, {0x8000, 0x2, 0x4, 0x3, 0x7, 0x4}, {0x2, 0x3, 0x5, 0x1f, 0x5, 0x1}, {0x8f, 0x4, 0x2, 0x8, 0x5}, {0x7, 0xff, 0x4, 0x3, 0x400, 0x3}]}, [{0x9, 0x8b8, 0x0, 0x8, 0xba, 0x27}, {0x6, 0xfff, 0x4, 0x6, 0x2, 0x80}, {0x4, 0x8, 0x7, 0x8, 0x7fffffff, 0x5}, {0x5, 0x4, 0x4, 0x8000, 0x6, 0x3}, {0x5, 0x80, 0x2, 0x2, 0x4, 0x3}, {0x6, 0x8001, 0xffffff7f, 0x3, 0x9}, {0x6, 0x101, 0xf6e8, 0x1, 0xfb, 0x6}, {0x7, 0x200, 0x400, 0x873, 0x8, 0x4}, {0x6, 0xff, 0x2, 0xfffffc01, 0xb, 0x4}, {0x4, 0x7ff, 0x251, 0x8, 0x1, 0x4}, {0x20, 0x6, 0x40, 0x3f, 0x2, 0xffff}, {0xff, 0x20, 0x7fff, 0x969c, 0x3ff, 0x9}, {0x1ff, 0x3, 0x4, 0x627, 0xe1ec, 0x5}, {0x3, 0xfffffff9, 0x2, 0x1000, 0x5, 0x6}, {0x5, 0x2, 0x4, 0x6, 0x22e, 0x7ff}, {0x8, 0x3f, 0x7f, 0x0, 0x9, 0xfffff06b}, {0x4b76, 0x5, 0x200, 0x1, 0x4, 0x8000}, {0x2, 0xffffff7f, 0xc6a, 0x6, 0x6, 0x7}, {0x10001, 0x7, 0x3f, 0xff, 0x1, 0x1c5}, {0x8, 0x5, 0x6, 0x81, 0x1, 0x10001}, {0x5, 0x2, 0x7f, 0x7, 0x7ff, 0x5}, {0x1, 0x401, 0x9, 0x19, 0x25, 0xd87}, {0xbd, 0xfffffffe, 0x2b, 0x6, 0x8, 0x9}, {0x2, 0xfffffe89, 0x8, 0x8000, 0x968, 0x1}, {0x1, 0x4, 0x7fffffff, 0xbc, 0x9, 0x2}, {0x8, 0x2, 0x101, 0x4, 0x5ba6, 0x8}, {0x6, 0x100, 0xda92, 0x8c, 0x100, 0x401}, {0xfffffc01, 0x3, 0x6, 0xb4, 0x3, 0x80}, {0x0, 0x5, 0x6, 0x4, 0x101, 0x3007}, {0xe, 0x13, 0x1, 0x20, 0x800, 0x80}, {0x0, 0xffff, 0x80, 0xb77, 0x6, 0x3}, {0x5, 0x81, 0x1a18, 0x1a7, 0x20, 0x1}, {0x0, 0x10001, 0xad, 0xe1, 0x6, 0x46}, {0x2, 0x6, 0x0, 0x3f, 0x7, 0xff}, {0x6d4, 0x5, 0x1, 0x7, 0xfffffffb, 0x1}, {0x3b, 0xfff, 0xb4, 0x86b, 0xffffffff}, {0x4, 0x2, 0x7f, 0x511, 0x20, 0x1}, {0xd4, 0x7, 0x800, 0x9, 0x80000001, 0x5}, {0x8, 0xf569, 0x8000, 0x5, 0x6, 0x6463}, {0x80000001, 0x6, 0x10000, 0xffffaaae, 0x20, 0x9}, {0x6, 0x5, 0x3, 0x2, 0x81}, {0x5, 0x80, 0x5, 0x5, 0x6, 0x7}, {0x7, 0x7c46, 0xffffffff, 0x80000001, 0x3, 0xfffffbd4}, {0x5, 0x3, 0x2c52, 0x52, 0x0, 0x200}, {0x8, 0x6, 0x7, 0x55da, 0xfff, 0x200}, {0x2, 0x1ff, 0x81, 0x7ff, 0xffffff9b, 0x9}, {0xfffffffd, 0x10001, 0x9, 0x6, 0x4, 0x8}, {0x0, 0x100, 0xb5, 0x9, 0x9, 0x8}, {0x3, 0xba, 0x332, 0x480000, 0xfffeffff, 0x4}, {0x1, 0x2, 0x101, 0x5, 0x4, 0xc5}, {0x0, 0x8, 0x12a00000, 0x4, 0x8b7}, {0xba3, 0x1, 0x5f, 0x9, 0x1000, 0x4}, {0x46, 0x6, 0x0, 0x7fff, 0x5a, 0x81}, {0x5b, 0x6, 0x2, 0x5, 0x952b, 0x1000}, {0xfffffff9, 0x1f, 0x1ff, 0x4, 0x1c, 0x1}, {0x7, 0x0, 0x6, 0x3, 0x7fff, 0x9}, {0x4, 0x800000, 0x401, 0x6, 0x7, 0x8}, {0x8000, 0x3a74, 0x8000, 0x401, 0xfffe0000, 0x5}, {0x2, 0x4, 0x7, 0xff, 0x1, 0xac}, {0x3f, 0x3f, 0xfffffffb, 0xfffffff7, 0xfd1, 0x6}, {0x9de, 0x0, 0x6, 0xf3a, 0x7, 0x3f}, {0x1, 0x48, 0xfffffff9, 0x1, 0x8, 0xd3c}, {0x5, 0x7, 0x4, 0x200, 0xc5, 0x8}, {0x4c0, 0x9a89, 0xdf, 0x5, 0xfff, 0x6}, {0x4, 0x1, 0x6, 0x1, 0x400, 0xff}, {0x7, 0xdb6, 0x7, 0x7, 0x2, 0x401}, {0x68, 0x10001, 0x2, 0x9, 0xfff, 0x3}, {0x8000, 0xe9a, 0x80, 0x7ff, 0x5, 0xfffffffc}, {0x40, 0x80, 0x7, 0x7ff, 0x6}, {0x3, 0x9, 0x6, 0x5, 0x10001, 0x6}, {0x100, 0x5, 0xdab5, 0x4, 0x8, 0xffffffff}, {0x7d, 0x5ee3, 0x8, 0x9a, 0xffffffaf, 0x1}, {0x7, 0x3, 0x3, 0x9aeb, 0x7, 0x261}, {0x7fffffff, 0x8001, 0x8d, 0x65, 0x0, 0x4}, {0x5, 0x1, 0xff, 0x9, 0x3ff, 0xfffeffff}, {0x2, 0x1000, 0x0, 0x10000, 0x8, 0x2}, {0x0, 0xfffffffa, 0x8, 0x401, 0x6, 0x8}, {0x6, 0x2, 0x0, 0x8, 0x1, 0xfffffff7}, {0xd, 0x81, 0xfffffd0a, 0x81, 0x9, 0x8}, {0x0, 0x200, 0x716, 0x80000000, 0x5, 0x16e}, {0x1, 0x80000001, 0x40, 0xff, 0x12, 0x80}, {0x3, 0x3, 0x9, 0xfffffffc, 0xcd, 0x800}, {0x1b, 0x7, 0xb199, 0x1f, 0x6, 0x7fff}, {0x6, 0x0, 0x3, 0x5, 0x1, 0x260c}, {0x6, 0x1, 0x4, 0x6f175fff, 0x0, 0x7fffffff}, {0x1, 0x1, 0x3ff, 0xffff8000, 0x9, 0xf7}, {0x0, 0x4, 0x40, 0x1, 0x7, 0xfffff800}, {0x4, 0x5, 0x2fe8, 0x100, 0x0, 0x6}, {0x1000, 0x13, 0x8, 0x6, 0x0, 0x3}, {0x400, 0x3ff, 0x100, 0xa0, 0x5, 0x576}, {0xc0, 0xf49, 0x7, 0x1, 0x2, 0x3f}, {0x9, 0x9716, 0xffffffff, 0x5, 0xb7d}, {0x7, 0x10000, 0x9, 0x7, 0x401, 0x9}, {0x3ff, 0x8, 0xc5, 0x80, 0xffffff33, 0x81}, {0x8001, 0x1, 0x10001, 0x7ff, 0x7, 0xc80}, {0x38, 0x2, 0x8001, 0x2, 0x0, 0xffff}, {0x5, 0xfd1f420, 0x4, 0xc75c, 0x401, 0x5}, {0x1, 0x3f, 0xf6, 0x1, 0x401, 0x1f}, {0x2, 0x6, 0x0, 0x3, 0x6, 0xfffffffd}, {0x6, 0x4, 0x8, 0xff, 0x0, 0x8}, {0x9, 0x800, 0xbd58, 0x8, 0x8, 0x3}, {0x576, 0x3, 0x8, 0x0, 0x7fff, 0x800}, {0x1ff, 0xfffffffc, 0x2e47, 0xfffffffd, 0x1, 0x2}, {0x80000000, 0x6, 0x8000000, 0x1, 0x4, 0x1000000}, {0x1, 0x1000000, 0x2b5, 0x9, 0x800, 0x3}, {0xfc7, 0x3, 0x1, 0x6, 0x0, 0x9}, {0x3, 0x1, 0x1, 0x3, 0x9, 0x3}, {0xffffffff, 0x3, 0x200, 0x3, 0x1, 0x9}, {0x81, 0x1ff, 0x4, 0xfffffff7, 0x100, 0x1f}, {0x8, 0xff, 0x5, 0x1, 0xfff, 0x4}, {0x9, 0x0, 0x3, 0x5, 0x7}, {0x8, 0x2e, 0x2, 0x1, 0x1f, 0x3}, {0xd061, 0x9, 0x5, 0x9, 0x40, 0x80000000}, {0xa55c, 0xd8, 0x4, 0x182, 0x8, 0x6}, {0x8, 0x8, 0x5, 0x6, 0x0, 0x8}, {0x1, 0x7, 0x0, 0x988d, 0x8, 0x100}, {0x401, 0x6, 0x7, 0x8, 0xb27, 0x8}, {0xa0, 0x6, 0x0, 0x4, 0x80}, {0x6, 0x3, 0x284, 0xffffffff, 0x5, 0x1}, {0x8000, 0x4, 0x8, 0x6e, 0xfffffffa, 0x6}, {0x1, 0x9, 0x2, 0x1, 0x6, 0x8}, {0x7, 0x8, 0x0, 0x20, 0x2, 0xfb}, {0x0, 0x8, 0x6, 0x6, 0x4, 0x8001}, {0x6, 0x4, 0xb, 0x3, 0x6, 0x8}, {0x7, 0x4, 0x80000000, 0x1f, 0x9, 0x5}, {0x9, 0x7e29, 0x3, 0x80000001, 0x20, 0xc807}, {0xffff, 0x3, 0x5, 0x8, 0x6, 0xccca}, {0x6, 0x6, 0x1000, 0x9, 0x1, 0x2a8}], [{0x5}, {0x0, 0x1}, {0x7}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x3}, {0x5}, {0x5}, {0x4}, {0x4, 0x1}, {0x3}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x4}, {0x0, 0x3}, {0x1, 0x1}, {0x4}, {0x3}, {0x3}, {0x5}, {0x3}, {0x0, 0x1}, {0x2}, {0x2}, {0x2}, {0x4, 0x1}, {}, {0x3}, {0x2}, {}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x2}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x2}, {0xa, 0x1}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x81c7237dc17006cd, 0x1}, {0x3, 0x1}, {0x3}, {0x5}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1}, {0x3}, {0x4, 0x1}, {0x1}, {0x3}, {0x5}, {0x4}, {0x2}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x0, 0x1}, {0x2}, {0x1, 0x1}, {0x3}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x6}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {}, {}, {0x3}, {0x5, 0x1}, {0x2}, {}, {0x4}, {0x3, 0x1}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x3}, {0x3, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x7c, 0x5, 0x0, 0x1, [{0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe80, 0x2, {{{0xffffaf3a, 0x6, 0x3, 0x7fffffff, 0x3}, 0x5, 0x2, [{0x7, 0x9, 0x8, 0x3f, 0x8, 0x1f}, {0x1ff, 0x5281, 0xfff, 0x401, 0xff, 0x9}, {0x7, 0x78, 0x8001, 0x2, 0x200}, {0x4, 0xce9, 0x6, 0x5, 0x6, 0x1c3d78c9}]}, [{0x885, 0xb239, 0x1, 0x1, 0x8, 0x1000}, {0x4ecfc4e6, 0x4, 0x0, 0x3ff, 0x1f, 0x7}, {0x1000, 0x2, 0x1ff, 0x1f11, 0xffffffff, 0xfffffff7}, {0xde85, 0x1ff, 0x7, 0xfffffff8, 0xffffffff, 0x2}, {0x0, 0x3, 0xf75d, 0x10000}, {0x1, 0x7fffffff, 0x1, 0xb52, 0x7, 0x3}, {0x1, 0x1, 0xfffffc01, 0x5, 0x8001, 0x65d9}, {0x100, 0x6, 0x800, 0xffffffff, 0x8, 0x3ff}, {0x5, 0x80, 0x1000, 0x80000000, 0x10000, 0x5}, {0x8, 0x1ff, 0x10000, 0xe9f, 0x8, 0x1}, {0xc2, 0x42b5, 0x0, 0x7fff, 0xe9f, 0x7}, {0x2, 0x1, 0x2, 0x3, 0x9, 0x8ee1}, {0xf4b1, 0x1, 0xfffffffa, 0x7, 0x6, 0x4}, {0x1, 0x2, 0x21a, 0x0, 0x4, 0x57c8}, {0x7, 0x4, 0x0, 0x6}, {0x6, 0x9, 0x0, 0x7f, 0x7, 0x7fff}, {0x3, 0x9, 0xd9a6, 0x1, 0x6, 0xffffffff}, {0x3, 0x6, 0x0, 0x7b, 0xffff, 0xff}, {0x400, 0x39ae, 0x5, 0x81, 0xffffffff, 0x8001}, {0x8b, 0x3f, 0x7, 0x9, 0x1, 0x3b48}, {0x71, 0x0, 0x3, 0xff, 0x80000001, 0x3}, {0x2, 0x3f, 0x24c8, 0x9, 0x7fff, 0x3}, {0x524d0af0, 0x1000, 0x72e5, 0x1, 0xfffffffa, 0x200}, {0x10000, 0x2bc1, 0x0, 0x1, 0x4, 0x6}, {0x0, 0x3f8b, 0x8, 0x7, 0x0, 0x7fff}, {0xfffffffb, 0x100, 0x0, 0xb5, 0x1, 0x5}, {0x5, 0x10000, 0x3, 0x1, 0x3, 0x20}, {0x9, 0x8, 0x4, 0x33ae, 0xfffffc01, 0x7ff}, {0x101, 0x0, 0x10000, 0x8000, 0x14000000, 0x200}, {0x100, 0xfffffffd, 0x6, 0xfffffffd, 0x3, 0x10001}, {0x5, 0x1, 0xd35b, 0x10000, 0x5, 0x640c}, {0x0, 0x4, 0x9, 0xe4, 0x2b73, 0x9}, {0x1, 0x3, 0x6, 0x3, 0xabae}, {0x2e0600e3, 0x8, 0xffffffff, 0x2, 0x0, 0x3}, {0x48, 0x4, 0x6, 0xa365, 0xa73a, 0xb4}, {0x1, 0xb0, 0xffffffb4, 0x0, 0x8, 0x100}, {0x761, 0x40, 0x6, 0x5, 0x2, 0x1c1}, {0x0, 0x8, 0x10d, 0xf8b, 0x5, 0x6}, {0x81, 0x7, 0x3f, 0x1, 0x8, 0x8000}, {0x8, 0x2, 0xfff, 0x0, 0x7fff, 0x2ba}, {0x81, 0x3, 0x18, 0x6, 0x5}, {0x41ee, 0x8000, 0x2, 0xff, 0x8000, 0x10000}, {0x0, 0x9, 0x80000000, 0x1a3, 0xff, 0x2}, {0x22, 0x8, 0x3ff, 0xe003, 0x7fff}, {0x2, 0x1, 0x8, 0x8001, 0x4, 0x5}, {0x8, 0x200, 0x7, 0x1, 0x7, 0x1}, {0x3, 0x0, 0x5, 0x20, 0x8, 0x6}, {0x8, 0x3f, 0x0, 0xfffffffe, 0x81, 0x3}, {0x400, 0x400, 0x6, 0x56, 0x4, 0x6}, {0x2c0, 0x6, 0x200, 0x5, 0x6, 0x100}, {0x27, 0x7, 0x2a9c, 0xfffffffe, 0x7fffffff, 0x2}, {0x8, 0x6, 0x6c, 0x80, 0xffffffff}, {0x9, 0x3, 0x0, 0x4, 0xb8000000, 0x7}, {0xe7d, 0x4, 0x7ff, 0x9, 0x80000001, 0x6697}, {0x9, 0x44fc, 0x4, 0x1ff, 0x4, 0x100}, {0x231, 0x8, 0x790, 0x7, 0x2, 0x3}, {0xffff5ffa, 0x81, 0x7, 0x1, 0x10001, 0x6}, {0x10000, 0x4, 0xfffffffd, 0x9, 0x4, 0x2}, {0x6, 0x0, 0x9, 0x7, 0x401, 0x80000001}, {0x3, 0x80000001, 0x8, 0x0, 0x81, 0x9}, {0x2, 0x5c, 0x9de, 0x2, 0x8, 0xffff}, {0x3, 0x8, 0x8, 0xfffffffa, 0x6, 0x4}, {0x1, 0x8, 0x0, 0x9, 0x8001, 0x5}, {0x4, 0x1, 0xffffffff, 0x8, 0x9, 0xf241}, {0x3, 0x4, 0x5, 0x2, 0xd3, 0x5}, {0x7, 0x1, 0x1, 0x2, 0xfffffffb, 0x9}, {0x1f, 0x8fa, 0xae, 0x10001, 0x5, 0x7ff}, {0x1, 0x2, 0x401, 0x3, 0x40, 0x1}, {0x1f, 0xce4, 0x9, 0x0, 0xfffff8e4, 0x2}, {0x3, 0x8, 0x3, 0x4, 0x7f, 0x1}, {0x0, 0x0, 0x4, 0x5, 0x7fffffff}, {0x4, 0x10000, 0xd9c, 0x6, 0x7, 0x100}, {0x1, 0x8, 0x200, 0xff, 0x8, 0x1}, {0x2, 0x9, 0x2, 0x9, 0x98, 0xffffffff}, {0x80000001, 0x1, 0x9, 0x5, 0x3f, 0x4c}, {0x8, 0x2, 0x81, 0x2, 0x8, 0x6}, {0x4, 0xfffffff7, 0x8, 0x41c, 0x5, 0xd6}, {0x1, 0x5, 0x3ff, 0x3, 0x1, 0x1000}, {0x7, 0x3, 0x20, 0x83c, 0x100, 0x7ff}, {0x8, 0x6, 0x3, 0x5, 0x7, 0x2}, {0x3, 0x9, 0x8, 0x3f1, 0x4, 0x51d}, {0x1, 0x855f, 0x2fbdc000, 0x2, 0x3, 0x6}, {0x6676, 0x7, 0x1000, 0x4, 0x3ff, 0x401}, {0x0, 0x2, 0x9, 0x7, 0x6809, 0x2}, {0x0, 0x0, 0x1000, 0xfffffffb, 0x80, 0xa1b6}, {0x3ff, 0x5, 0xbccb, 0xee7, 0xdd6, 0x6}, {0x8, 0x800, 0x0, 0x0, 0x3, 0x4}, {0x80000000, 0x6, 0x7fffffff, 0x1, 0x81, 0x267dc26c}, {0xffff, 0x0, 0x4, 0x6, 0x5, 0xffffffff}, {0x1, 0x8, 0x1, 0x8001, 0x6, 0x431}, {0x80, 0x0, 0x5, 0x4, 0x3, 0x5}, {0x8000, 0x3aa, 0xfffffffc, 0x3, 0x6, 0x2}, {0x9, 0x2, 0x3, 0x6, 0x1f, 0x1}, {0x1, 0x6, 0x6, 0xfff, 0x800, 0x1}, {0x1, 0x2, 0x0, 0x8, 0x10001, 0x8}, {0xffff, 0x0, 0x3f, 0x2, 0xfffffffa, 0x4}, {0x8001, 0x10001, 0x8, 0xd89, 0x200, 0xf}, {0x7d5, 0x8, 0x101, 0xa9, 0x6, 0x1}, {0x5, 0x1c37b248, 0x8, 0x7, 0x1f, 0xe2}, {0x7, 0x4b340495, 0x227, 0x3, 0x1, 0x80000000}, {0x6, 0x42d8, 0x0, 0xf322, 0xe1, 0x401}, {0x1ff, 0x800, 0x6, 0x1, 0x9be8, 0x4}, {0x242b, 0x0, 0x2, 0x6, 0x9, 0x401}, {0x7f, 0xfffffc01, 0x3, 0x2, 0x5, 0x21c1}, {0x474, 0x2, 0xffff, 0x2, 0x3ff, 0x2c}, {0xfffffffe, 0x1, 0x200, 0xffff, 0xdc4a}, {0x3, 0x0, 0xfff, 0x1, 0x8000, 0x6f8}, {0x6, 0x1, 0x63, 0x1, 0xffffffff, 0x2}, {0x7f, 0x5, 0x9, 0x5, 0x0, 0xff}, {0x9, 0x4, 0x6, 0x3, 0x2, 0x10000}, {0x1, 0x3, 0x9, 0x9, 0x9, 0x3}, {0x4532735, 0x7, 0x42, 0xe4, 0xfffffc01, 0x6}, {0x0, 0x1, 0x5, 0x8, 0x2, 0x3}, {0x5, 0x9, 0x2, 0x3, 0x0, 0x800}, {0x3, 0x8, 0x4, 0x5, 0x1}, {0x7, 0x3, 0x9, 0x400, 0x80000000, 0x7}, {0x6, 0x9, 0x1ff, 0x10001, 0xa7a, 0xffff7fff}, {0x8, 0x5, 0x4165, 0x3, 0x6, 0x8}, {0x5, 0x6, 0xffffffff, 0xfffffbff, 0x2, 0x3ff}, {0x1, 0xd1, 0x0, 0x3, 0x10001, 0x401}, {0x9, 0x81, 0x8, 0x9, 0x6, 0xfff}, {0x4, 0x16, 0x7fffffff, 0x5, 0xfe, 0x3}, {0x4, 0xfaf5, 0xf786, 0x1, 0x0, 0x1ff}, {0x6, 0x677, 0x6, 0x8, 0x8, 0x509}, {0x8, 0x4, 0x4, 0x0, 0xac58, 0x4}, {0xf5, 0x1, 0x3f, 0xfffffffc, 0x2, 0xfffffff9}, {0x2, 0x3e27, 0x6, 0x6b88, 0x5, 0x8000}, {0x5, 0x7, 0x100, 0x1ff, 0x9, 0x2}], [{0x1, 0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x4}, {}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x1, 0x4dde950d7e95b691}, {0x1}, {0x4}, {0x2}, {0x4, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1d6feee3ab23ca72, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {}, {0x1}, {0x4}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x2}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x2}, {0x0, 0x1}, {0x4}, {0x1}, {}, {0x3, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x4}, {0x4}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x1}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0x3ff, 0xce7b, 0x0, 0x800, 0x1971}, 0x6, 0x7f, [{0x6, 0x5, 0x1d0, 0x7, 0x2, 0x81}, {0x6, 0x8, 0x99, 0x3459, 0x7, 0x7}, {0x4, 0x400, 0xffffffff, 0x1, 0x3, 0x7}, {0x9, 0x7, 0x9, 0x20, 0x0, 0x80000001}, {0x3, 0x7, 0x8000, 0x0, 0xae27, 0x81}, {0x9, 0x3f, 0x5, 0x2, 0x8, 0x2}, {0xfffffc00, 0x3, 0x569, 0x26, 0x1, 0xffffffe2}]}, [{0x26f, 0x80, 0xefe, 0x3f, 0x9, 0x10001}, {0x5, 0x80, 0x2, 0x0, 0x1000, 0x2}, {0x7, 0x81, 0x0, 0x3f, 0x3, 0x4792}, {0x445a, 0x101, 0x7f, 0x1, 0x3e, 0x5}, {0x6739a307, 0x5, 0x5, 0x1, 0x400, 0xfffffff8}, {0x2, 0x8, 0x1, 0x7, 0x6, 0xbd6f}, {0xfff, 0x577, 0x9, 0x1, 0x7, 0xffffff8e}, {0x807, 0x2, 0x1, 0x7fff, 0x1, 0xffffffff}, {0x36b2, 0xd99a, 0x2, 0x7, 0x5, 0x1000}, {0x401, 0x6, 0x6, 0x401, 0x80000000, 0x7fffffff}, {0x80, 0x10000, 0x0, 0x80000001, 0x67, 0x7}, {0x1, 0x80, 0x6, 0x10001, 0x7, 0x10001}, {0x6, 0x40, 0x6, 0x7, 0x1, 0x6}, {0x5, 0x4, 0x0, 0x8, 0x1, 0xaf91}, {0xfffffffb, 0x5, 0x9, 0x8, 0x5, 0x2}, {0x1, 0x400, 0xa6000000, 0x4, 0x20, 0x7fff}, {0x3, 0x2, 0xc42, 0x3fba071b, 0x7, 0x7fff}, {0x6, 0x97, 0x2, 0xfffffff7, 0x1, 0x6}, {0x401, 0x3, 0x6, 0x101, 0x0, 0xc016}, {0x9, 0x401, 0x0, 0x7, 0xf0d2, 0x5}, {0x1, 0x5, 0x7fff, 0x1, 0xce, 0x4}, {0xe, 0x11a, 0x8, 0x1, 0x2}, {0x10001, 0x9f, 0x11a, 0x7, 0xfff, 0x80000000}, {0x9, 0x40000, 0x4, 0x7, 0x2, 0x6}, {0x9, 0x8, 0x4, 0x380a, 0xb85, 0x2}, {0x2, 0x6, 0x3, 0x1f, 0xd9, 0x2}, {0xffffffe0, 0x3, 0x8, 0x9, 0x9}, {0x1f, 0x20, 0x80000000, 0x20, 0x5}, {0x950, 0x10000, 0x1, 0x5, 0x7, 0x1ff}, {0x0, 0x1, 0x5, 0x8, 0x7f, 0x97}, {0x10000, 0x80000000, 0x7, 0x6, 0x9, 0x7}, {0xfffffff8, 0x7fffffff, 0x6, 0x8000, 0x81, 0x5}, {0x0, 0x7, 0x2, 0x6, 0x2, 0xd4}, {0x0, 0x4, 0x2, 0x6, 0x2, 0x6}, {0x401, 0x7ff, 0x7, 0x1, 0x40, 0x3}, {0x3, 0x4, 0x9, 0x8, 0x9, 0x5}, {0x38d, 0x6, 0x800, 0x4, 0x80000001, 0x7}, {0x3, 0x3ec3, 0x401, 0x7, 0x2, 0x3}, {0x39, 0x4, 0x5, 0xddf, 0x5, 0x2}, {0x7fff, 0x8001, 0x733, 0x2, 0x1dd, 0x1}, {0x2, 0x7, 0x1ff, 0x300d, 0x935b78a9, 0xc661}, {0x3ff, 0x1000, 0xe8f1, 0x9, 0x7, 0x8}, {0x9, 0x7, 0x0, 0x4, 0x7, 0x8}, {0xe3, 0x1, 0xec5, 0x9, 0x5, 0x7fffffff}, {0x60, 0x3ff, 0x5, 0xffff, 0x80000001, 0x1}, {0x1, 0x933, 0x80000001, 0x81, 0x8c, 0x6}, {0x4, 0x4, 0xc9c5, 0x7ff, 0xfe, 0x4}, {0x5, 0x4, 0x1f, 0x5, 0x7ff, 0x10000}, {0x5, 0x1, 0x6, 0x2, 0x4}, {0x4, 0xfffffff8, 0x3c9, 0xc646, 0x0, 0x5}, {0x7f, 0xfffff801, 0xe8, 0x80000001, 0x735}, {0x3, 0x3, 0x4, 0x7, 0x0, 0x4}, {0xfffffff8, 0x10001, 0x5, 0x200, 0x4, 0xb1a6}, {0xe12, 0x41d, 0xb0d, 0x3, 0x9, 0x3}, {0xfffffffc, 0x8, 0x48a, 0x200, 0x7, 0x91}, {0x7, 0xffff7fff, 0x2, 0x1, 0xff000, 0x1}, {0x9, 0x80, 0x1000, 0x1, 0x401, 0x2}, {0xa3, 0x3, 0x7f, 0x9, 0x3, 0x100}, {0x29c8, 0x5, 0x42e, 0x0, 0x80000000, 0x8}, {0x9, 0x401, 0x5, 0x2, 0x0, 0x9}, {0x4, 0x5, 0x6, 0x9, 0x2, 0x100}, {0x5, 0x2, 0x401, 0x7ff, 0x6, 0x2}, {0x9, 0x0, 0x35f107c2, 0x4, 0x7fffffff, 0x7}, {0x8, 0x1000, 0x80, 0x0, 0x8001, 0x4}, {0x3f, 0x1, 0x0, 0xfffffff8, 0xae, 0x4}, {0x7, 0x2, 0xc0, 0x4, 0x0, 0xffff0000}, {0x400, 0x7, 0x7, 0x4, 0x7f, 0x3}, {0x7, 0x8, 0x2, 0x1, 0x5, 0x8}, {0x1, 0xccb, 0xfffffbff, 0xffff07de, 0x8, 0x4}, {0xaf2, 0x9, 0x5, 0x3f, 0x4, 0x9}, {0x3ff, 0x2, 0x8000, 0xfffffff7, 0x2, 0xc5e}, {0x2, 0x5, 0xffffffff, 0x4, 0xfffff886, 0x5}, {0x100, 0x9, 0x9a5, 0xffffffff, 0x6, 0x100}, {0x4, 0x2, 0x9, 0x3, 0x2, 0x800}, {0x6, 0x81, 0x5eba, 0x1, 0x5, 0x7ff}, {0x585, 0x7, 0x10001, 0x9, 0xe55, 0xac000000}, {0x80000001, 0x50c, 0xfffffe01, 0x3, 0x9, 0x12}, {0x8, 0x1000, 0x7, 0x7fff, 0x4328, 0x7f}, {0x2, 0x200, 0x1, 0x1752, 0xffff, 0x4}, {0x8, 0xffff, 0x4, 0x1, 0xdd9, 0x7fffffff}, {0x7, 0x9, 0x0, 0xfffffffc, 0x10000, 0x2}, {0x401, 0xe5, 0x0, 0x8, 0x1}, {0x5, 0xffff, 0xff, 0xda, 0x401, 0xb7}, {0x0, 0xfffffffd, 0x10000, 0x101, 0x6, 0x1}, {0x3, 0x0, 0x3ff, 0x7, 0x6, 0x800}, {0x6, 0x3, 0x7fffffff, 0x81, 0x101, 0x4}, {0x4, 0x6, 0x6, 0xfffffff9, 0x3ff, 0xc5e2}, {0x400, 0x1, 0x20000000, 0x1, 0x2, 0xfffffffa}, {0x1000, 0x3f, 0x8, 0x7, 0x1, 0xfffffffb}, {0x8, 0x1, 0x8, 0x8, 0x2de95bf3, 0x6}, {0x3, 0x8be, 0x80, 0x8, 0x2, 0x7fff}, {0x2, 0x10000, 0x3, 0x2d7e, 0x800}, {0x5, 0x80000000, 0x80, 0xff000000, 0x94, 0x1}, {0x4, 0x100, 0x8, 0x1, 0xc000000, 0xdef}, {0x1ff, 0x4, 0xb09, 0x9, 0xc70d, 0x8}, {0x9, 0x9, 0x1f, 0x101, 0x7, 0x7fffffff}, {0x1, 0x0, 0xf7, 0x1f, 0x7fffffff, 0x7fff}, {0x5, 0x4, 0x80000000, 0x7fff, 0xfffffff9, 0x800}, {0x2ed, 0x59c, 0x4, 0x7, 0xfffffffa, 0x1000}, {0x20, 0x5, 0xd8, 0x100, 0x5, 0x80}, {0x6, 0x3, 0x1, 0x8000, 0x200, 0x8}, {0x1, 0x3, 0x200, 0x7, 0xa22, 0x8000}, {0x7, 0x0, 0x1, 0xffff, 0x2, 0x3}, {0x80000000, 0x8, 0x1f, 0x200}, {0xffff, 0x0, 0xed6a, 0x5, 0x7, 0x4}, {0x7fff, 0x81, 0x1, 0x6, 0x7, 0x1}, {0x7, 0x20, 0xfff, 0x40, 0x8, 0x401}, {0x40, 0x1000, 0x9, 0x3, 0x101, 0xfffffffe}, {0x9, 0x4, 0x4, 0x9, 0x4, 0x7}, {0x3ff, 0xfffff7f1, 0x200, 0x80, 0x7fff, 0x4}, {0x5, 0xb12, 0x0, 0x3, 0xceb, 0x9}, {0x0, 0x8000, 0x5, 0x40, 0x4, 0x18}, {0xfff, 0xd01a, 0xd2, 0x2082, 0x20}, {0x10001, 0x4, 0x3, 0x4, 0x8001, 0x6}, {0x1f, 0x6, 0x5, 0x3, 0x2, 0x1ff}, {0x7, 0x9, 0x7fff, 0x43, 0xfffffffb, 0xfff}, {0x10001, 0x6, 0x5, 0x16, 0x4}, {0x8, 0x3, 0x20, 0x7, 0x1}, {0xdb, 0x3, 0x20, 0x1, 0x701cc4ad, 0x6}, {0x80000001, 0x6, 0x101, 0x2000000, 0x524d, 0x9}, {0x2, 0x0, 0xc6e, 0x2, 0x101, 0x1ff}, {0x1, 0x7a54, 0x7, 0x8, 0x2, 0x4baa}, {0x0, 0x2, 0x7, 0x8, 0x2, 0x3ff}, {0x7fff, 0x1, 0x1, 0x3, 0x800, 0x8}, {0x6, 0xffffffff, 0x9, 0xd05b, 0xb2c, 0x1f}, {0xfffffff9, 0x3, 0xde, 0x3ff, 0xfffffffa}, {0x10001, 0x6, 0xef56, 0x10001, 0x6, 0x80000000}, {0x0, 0x7, 0x7, 0xaa8, 0x4, 0x9}], [{0x5}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0xab239b697cf68e6e}, {0x5}, {0x5, 0x1}, {0x5}, {0x1}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x1}, {}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x3, 0x146fb374b7cae858}, {0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x5}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x1}, {}, {0x4}, {0x3, 0x1}, {0x7}, {0x3, 0x1}, {0x4}, {0x2}, {0x1}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x5, 0x1}, {0xd1266ce720664876, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {}, {0x6, 0x1}, {0x2}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x3, 0x1}, {0x3}, {}, {0x5}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2}, {}, {0x5}, {0x4, 0x1}, {}, {0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x7, 0x1}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x2}, {0x2}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x1, 0x1}, {0x4}, {0x5}, {0x5}, {0x2, 0x1}, {0x2}, {0x1}, {0x4, 0x1}, {0x2}, {0x2}]}}, @TCA_PEDIT_KEYS_EX={0x60, 0x5, 0x0, 0x1, [{0x4}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0xdeee27bb8f2ff5cc}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x4}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x4}]}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x28, 0x0, 0x0, 0xfffffff8, 0x4}, 0x1, 0x20, [{0x6, 0x5, 0x3, 0x2, 0x400, 0xffffffff}, {0x7, 0x2, 0x7, 0xffff, 0x28, 0x8}, {0x1000, 0x6, 0x800, 0x0, 0x1, 0x8}]}, [{0x200, 0x1c21, 0x20, 0xff, 0xc000, 0xff}, {0x11d, 0x2, 0x3, 0x8, 0x1ff, 0x9}, {0x81, 0xf85, 0x7fffffff, 0x4, 0x1, 0x400}, {0x3f, 0x1000, 0x0, 0xffffffff, 0xffffffff, 0x4}, {0x80000000, 0x1000, 0xfff, 0xf2, 0x80000001, 0x1}, {0x1000, 0x6, 0xf6d7, 0x6, 0x6, 0xffff}, {0x0, 0xfff, 0x7, 0x87, 0x1}, {0x1000, 0x1, 0x6, 0x1, 0x8, 0x3}, {0x8000, 0x1, 0x2, 0x3f, 0x200, 0x20}, {0xbbf, 0x8, 0x5, 0x5e1, 0xff, 0x5e03}, {0x3, 0x1, 0x9, 0x50, 0x1, 0x7}, {0x3, 0x4, 0x7fff, 0x10001, 0x4, 0x6}, {0xac, 0x401, 0x2, 0x4, 0xec, 0x80}, {0x5, 0x5, 0x5, 0x101, 0x2, 0x3f}, {0x2, 0x5, 0x81, 0x5, 0xffffd14e, 0x2}, {0x1000, 0x1, 0xfffffffc, 0x0, 0x4, 0x40}, {0x9, 0x1400, 0x401, 0xe09, 0x4, 0x5}, {0x40, 0x4, 0x3, 0x1f, 0x6, 0x56dd}, {0xfff, 0xa843a3a, 0x2, 0x6, 0x0, 0xfaa0}, {0x2, 0x8, 0x9, 0xffffffff}, {0xc459, 0x1, 0x2, 0xff, 0x1, 0x212}, {0x6, 0x1, 0x10000, 0x7, 0x9164, 0x7f}, {0x3, 0xffffffe1, 0xffffffff, 0x7f, 0x6, 0x7f}, {0x0, 0x7, 0x9, 0x6, 0xfffffe01, 0xffff0000}, {0x6, 0x7, 0x80000001, 0x10001, 0x0, 0x1}, {0x2, 0x1, 0x20, 0x8, 0x2, 0x3b817659}, {0x3, 0x2, 0x199, 0xa34d, 0x40, 0x80000000}, {0x5, 0xfffffffa, 0x1ffe00, 0xd60, 0x9, 0x1f}, {0xfff, 0xffffffff, 0x2, 0x67, 0x4, 0xc32}, {0x7f, 0x2, 0x8, 0x3f, 0x8, 0x6534}, {0x80, 0x2, 0x29ad, 0x4, 0x101}, {0x1, 0x1f, 0x2cce7566, 0x8, 0x1f, 0x72f}, {0x9, 0x6, 0x100, 0x7fff, 0x7f, 0x482e5570}, {0xcdd0, 0x2, 0x6, 0x50, 0x6, 0x6}, {0x7, 0x3f, 0x1, 0x6, 0x3, 0xffffff80}, {0x0, 0x40, 0x9, 0x10001, 0x4, 0x46e}, {0x8, 0xfffffffa, 0x781, 0x10000, 0x2b91, 0x3a}, {0xfe33, 0x5, 0x8, 0x5, 0x7, 0xfff}, {0x0, 0x5d, 0x8, 0x6, 0x7fffffff, 0x7}, {0x5, 0x7fff, 0x3, 0xff, 0x9}, {0x9, 0x4, 0x80000001, 0x6, 0xffffca1e, 0x10000}, {0x0, 0xfffffff8, 0x8, 0x8, 0x7fff}, {0x5ad, 0x3, 0x5, 0x1000, 0x2}, {0x33f, 0x5, 0x3000000, 0x0, 0x9, 0x3f}, {0x5, 0x7, 0xfffffff9, 0x4, 0x7f, 0xf627}, {0x80000000, 0x1, 0x401, 0x1ff, 0x1000, 0x1}, {0x5, 0x50a5, 0x1000, 0x9, 0x2, 0x1}, {0x4000400, 0xffffffff, 0x9159, 0x6, 0x9, 0x7}, {0x10000, 0x6, 0x4, 0xb05, 0x3, 0x5}, {0x1f, 0x9, 0x0, 0x4, 0x0, 0x8}, {0x9, 0xfffffff8, 0x7, 0x0, 0x9, 0x37}, {0x43, 0x3, 0x1ff, 0x5, 0x80000001, 0xfffffffe}, {0x7, 0x8, 0x5, 0x400, 0x2, 0x1}, {0xcbae, 0x0, 0x17, 0x4, 0x3, 0x10001}, {0xabf, 0x5, 0x5, 0x8, 0x3, 0xef3}, {0x80, 0xfffffffa, 0x351, 0x4005, 0x4, 0x91d}, {0xffffffc0, 0x5, 0xffffffff, 0x4, 0xfdfd, 0x89c}, {0x6, 0x5, 0x4, 0x400, 0x0, 0x8}, {0x0, 0x4, 0x7, 0x4, 0x401, 0xfff}, {0x7, 0x9a62, 0x9, 0xde, 0x1, 0x57a1edc3}, {0x1, 0x1000, 0x8001, 0x1, 0x6, 0xc8}, {0xef, 0x5, 0x1, 0x1, 0x0, 0x3}, {0x4, 0xa6fe, 0x4, 0x7, 0x3f, 0x7fffffff}, {0x6, 0x20, 0x6b, 0x2, 0x80000000}, {0x5, 0x1, 0xda84, 0xfffffff8, 0x3, 0x8001}, {0x6, 0x3, 0x0, 0x10001, 0x4, 0xffffff9e}, {0x111, 0xe1b4, 0x4, 0xb81, 0x24aa, 0x2}, {0x5, 0x6, 0xc2c, 0x1, 0x4, 0x6}, {0x9, 0x1000, 0xfff, 0x7f, 0x2}, {0x4, 0x25980, 0x100, 0x1, 0xacb8, 0x1}, {0x1, 0x4, 0xffffffe1, 0x0, 0x7fffffff, 0x25ae}, {0x8000, 0x8, 0xfffffff7, 0x1, 0x800, 0x6}, {0x7, 0x98, 0x2, 0x9, 0x9d72, 0x9}, {0x2, 0x8001, 0xfb1, 0x80000000, 0x6, 0x800}, {0x100, 0xfffffff9, 0x2, 0x401, 0x2}, {0x2, 0xe2, 0x1, 0x3, 0x34e0000}, {0x6, 0x6, 0x7, 0x20, 0x1000, 0x5}, {0x1, 0xff, 0x3ff, 0x3f, 0x6, 0x3}, {0x0, 0x5, 0xee9, 0xfffffe01, 0x2, 0xd51}, {0x7fff, 0x5, 0x8, 0x907, 0x100, 0x1}, {0x8001, 0x5, 0x7, 0x40, 0xffffffff, 0xfe8}, {0x2, 0x7, 0x0, 0xf4, 0x2, 0x16}, {0x0, 0x2, 0x7ff, 0x9, 0x0, 0x10001}, {0x401, 0x1000, 0x7f, 0x1, 0x6, 0x3}, {0x6, 0x3, 0x6, 0x0, 0x7, 0x1}, {0x8, 0x4, 0x8, 0x2, 0x8001, 0x1000}, {0x7, 0x0, 0x10c800, 0x8000, 0x96, 0x5}, {0xffff, 0x80000001, 0x4, 0x8, 0x1, 0x10000}, {0x5, 0x8, 0x2434, 0x1, 0x9, 0x4}, {0x2, 0x9, 0x3, 0xaa, 0x3f, 0x5}, {0x0, 0x73, 0x3ff, 0xce, 0x9, 0x7ff}, {0x80, 0xffffff00, 0x6c2cfd5b, 0x2, 0x0, 0x6}, {0x0, 0x335, 0x7, 0x5, 0x8001, 0x4448}, {0xd85, 0x8, 0x8, 0xff, 0x4, 0x8}, {0x8a37, 0x5b3, 0x80000000, 0x1ff, 0x3, 0xffffffff}, {0x2, 0x4, 0x10001, 0x3ff, 0x1, 0x6}, {0x4, 0x10000, 0xffff, 0x0, 0x259, 0xe39}, {0x1ff, 0x7, 0x8, 0x3ff, 0x1, 0xffffff1b}, {0x2, 0x1, 0x7, 0x1ff, 0x9, 0x4}, {0x1, 0x6, 0x101, 0x7, 0x1f, 0x8000}, {0xc40, 0x0, 0x3, 0x80, 0x8, 0x20}, {0x101, 0x5, 0x6, 0x80, 0xfffffffa, 0x80000001}, {0x4, 0x1, 0xfffffff9, 0x1, 0x10001, 0x5}, {0x4, 0x3, 0x495, 0x1, 0x18, 0x309}, {0x3, 0x4, 0x1, 0x8, 0x2, 0x2}, {0x0, 0x6, 0x2, 0x10001, 0x2, 0x82f}, {0x40, 0x9, 0x7, 0xea, 0x8, 0x5}, {0x8, 0x3, 0x1, 0x7, 0x9}, {0x26987b48, 0xfff, 0x7f, 0x5, 0x5, 0x7}, {0x9, 0x7, 0x2, 0x2602, 0x1f, 0x1}, {0x7fffffff, 0x4, 0x200000, 0x2, 0x7f, 0x5}, {0x9664, 0xcfa, 0x140, 0x7, 0xc9000000, 0x81e}, {0x7, 0x3, 0x40, 0x7, 0x80, 0x3}, {0x2, 0x76, 0xfffffff8, 0x4, 0x2, 0x7}, {0x6598, 0x1f, 0x2, 0x3, 0x80000001, 0x9}, {0x8, 0x78000000, 0x4, 0x2, 0x5}, {0x0, 0xfffffe9d, 0x20, 0x2, 0x7ff, 0x8}, {0x9, 0x1, 0x1, 0x10001, 0x3c, 0x1a}, {0x101, 0x1, 0x99, 0x1, 0x9}, {0x80, 0x7fff, 0x9, 0x9, 0x8, 0x10001}, {0x9, 0xe11, 0x5, 0x80000001, 0x5, 0xec}, {0xff, 0x1, 0x1, 0xffffffff, 0x4, 0x8001}, {0x0, 0xfffffff7, 0x1, 0x3, 0x3, 0x1}, {0x4c4b, 0x62b, 0x8000, 0xa8e2, 0x0, 0x9}, {0x81, 0x3, 0x0, 0x1, 0x3215, 0x7}, {0x4, 0x9, 0x7, 0x1f, 0x1, 0x6}, {0x3f, 0x4, 0x1, 0x9, 0x4, 0xff}, {0x401, 0x8, 0x1200, 0x5, 0xe7, 0x918}], [{0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x4}, {0x3, 0x1}, {0x2}, {0x4}, {0x4}, {0x4}, {0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x1df7b26a616d67ed}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {}, {0x1, 0x1}, {0x5}, {0x4}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {0x4}, {0x7}, {}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x297fc460b28c628d, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x4, 0x1}, {}, {0x4, 0xb1274c3f5f378759}, {0x0, 0x1}, {}, {0x5}, {}, {0x2}, {0x2}, {0x1}, {0x2}, {0x2}, {0x1, 0x1}, {0x5}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {}, {0x7, 0x1}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0xe7897333f1b95e97}, {0x1}, {}, {0x2, 0x1}, {0x2}, {}, {0x1, 0x1}, {0x3, 0x2}, {0x4}, {0x5}, {0x3}, {0x0, 0x1}, {0x1}, {0x1}, {0x4}, {0x5}, {0x3}, {0x5}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x2}, {0x2}, {0x2, 0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {0x2}, {0x2}, {0x1, 0x1}, {0xf185290eeb25093f, 0x1}]}}]}, {0x41, 0x6, "50ec8e4dc9727f480e537111633944acc04d57be452ed972be50f2bd6eb4e248d55bf24e04c683434ca6e53b758a22298d81c1b931831261df312033b3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}, {0x274c, 0x1, [@m_gact={0xc4, 0x1a, 0x0, 0x0, {{0x9}, {0x4}, {0x97, 0x6, "f21c8c78aabb6fd135f608284a6bd873419b840675d20b74e15967ace52b99765c56cd44d7db374e3846d90d364bd0022ae83e62dea5bc46ff2d8dbcaee3b1a0a16696b5edca867e88326c71d3f05801f9d54195bc1391ff96cd1d4bf9a487044c1ba24109dca4e55309aa7bb5ae91ab0151b197d8eaa29a0e12807f407b422e6a5dceda21d16df2d8804dc135b9618d41ed76"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_police={0x1f00, 0xa, 0x0, 0x0, {{0xb}, {0x1de8, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xc8, 0x9, 0x5, 0xfffffff7, 0x4, 0xffffffe0, 0xffff, 0x8f, 0x1, 0x5, 0x2, 0x0, 0x80, 0x20, 0xbd, 0x3, 0x3, 0x4, 0x4, 0x5, 0x33b1, 0x9, 0x3f, 0x7, 0x7, 0x401, 0x1000, 0x99380000, 0x5, 0x6, 0x9, 0xc000000, 0x7, 0x6, 0x7, 0x2, 0x101, 0x4, 0x9, 0x1, 0x7fffffff, 0xffffffff, 0x0, 0x5c9, 0x7fffffff, 0x20, 0x1, 0x4292, 0x50a, 0xdbbd, 0xffffffe0, 0x2, 0x40, 0x80, 0x9, 0x3, 0x20, 0x81, 0x1a1c2b3d, 0x4, 0x7c, 0x1, 0xffffffff, 0x100, 0xa2, 0x9, 0x0, 0x1, 0x20, 0x8001, 0x5, 0x3, 0x5, 0x4, 0x96, 0x10001, 0x17, 0x2, 0x6b, 0xa8a3, 0x10000, 0x830, 0x100, 0x6, 0x3d, 0x7, 0x9, 0xb71b, 0x3, 0x7, 0x6, 0x5, 0x6, 0x2, 0x4, 0x2, 0x7fff, 0x3, 0x1, 0x8, 0x100, 0x5, 0xfff, 0x7fffffff, 0x4, 0x2, 0x0, 0x6, 0x1, 0xc0000000, 0x6, 0x8, 0x9, 0xffffffff, 0x3, 0x7, 0x68, 0xe7, 0x9, 0x9, 0x8001, 0x7fff, 0x200, 0x5, 0xc01, 0x200, 0x3, 0x5, 0x2, 0x6, 0x20, 0x3ff, 0x6, 0xc03, 0x5, 0x8e, 0x835, 0x984, 0x800, 0xb7, 0x4, 0x4, 0x401, 0x7fffffff, 0xffffff39, 0x6aad, 0x16, 0x4, 0x0, 0x31, 0xc12, 0x7, 0x8, 0x1ff, 0x4, 0x69053588, 0x80, 0xfffffffa, 0x2, 0x401, 0x2, 0x0, 0x8001, 0xd9d7, 0x3ff, 0x1000, 0x5ff, 0xfffffffd, 0x6, 0x8001, 0x232, 0x9, 0x8, 0x7f, 0x6, 0x3f, 0x6, 0x7, 0x0, 0x10000, 0xd5d, 0x7, 0x1000, 0x3, 0x10001, 0x5, 0x3, 0x8, 0x20, 0x10001, 0x8, 0x4, 0x4, 0x5, 0x0, 0x9, 0x2, 0x4, 0x1, 0x1, 0xaf30, 0x0, 0xfffffffe, 0x5, 0x1ff, 0x9, 0x6f7f, 0x7, 0x6, 0x8, 0xffffffd7, 0x1, 0x1, 0x1, 0x4, 0x6, 0x5, 0x0, 0x9, 0x6, 0x2, 0x1c0000, 0x401, 0x7, 0x0, 0x8, 0xfffff800, 0x401, 0x8df, 0x3, 0xd1, 0x124a, 0x7f, 0x5, 0x8000, 0x1087, 0x80, 0x7, 0x1, 0x7, 0x3, 0x5, 0x7fffffff, 0xe7, 0x3e00, 0xab21, 0x100, 0xfffffe01, 0x6, 0x6, 0x9, 0xf3, 0x5, 0x233, 0x0, 0x3]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1000, 0x1000, 0xffff, 0x6, 0x48bc, 0x3, 0x1, 0x0, 0x9, 0x7, 0x8, 0xd2, 0xe016, 0xfffeffff, 0x81, 0x1, 0x41, 0x5, 0x7, 0x3ff, 0x7, 0x100, 0x1, 0x55, 0x1ff, 0x3, 0x800, 0x2, 0x3, 0x1, 0x5, 0x101, 0x2, 0x1, 0x8, 0x6, 0x8, 0xffffffff, 0xffff, 0x1, 0x5, 0x5, 0x5, 0x80000000, 0x0, 0x8, 0x6, 0x4e, 0xfff, 0xc32, 0x6, 0x1d000, 0x40, 0x5, 0xffffffd4, 0x9, 0x0, 0x0, 0x7, 0xfffffffd, 0x1, 0xffffff0d, 0x4, 0x7ff, 0x8, 0x7fffffff, 0x9e, 0x1, 0x2cdd, 0x7f, 0x81, 0x9, 0x2, 0x4, 0x7, 0x526, 0x8, 0x6, 0x2, 0x1, 0xfffffff9, 0x6, 0x8, 0x8, 0x88c, 0x6, 0x1, 0x0, 0x7f, 0xfff, 0x2, 0x4da, 0x5, 0x5, 0x40, 0x81, 0x10000, 0x7, 0x9, 0x2, 0x6, 0x3c2, 0x1, 0x0, 0x34, 0x0, 0x2, 0x7, 0x72f, 0x3, 0x0, 0x7, 0x4, 0x1, 0xe90a, 0x10001, 0x1ff, 0x5, 0x0, 0x330000, 0x8001, 0x3, 0x8, 0x1, 0x57cc, 0xae4, 0x0, 0x101, 0x3, 0x7, 0x0, 0x7fff, 0x1, 0x0, 0x3, 0x3, 0x2, 0xffffffff, 0x8, 0x1, 0x80000001, 0x80000001, 0x400, 0x3, 0x3, 0x8, 0x6, 0x2, 0xc, 0x8b0, 0x3, 0xd1, 0x7f, 0x1b, 0x10000, 0x200, 0x2, 0x7, 0x3f, 0x6, 0xffffff13, 0x9, 0x9, 0x8, 0x1, 0x0, 0x9, 0x7, 0x1, 0x180000, 0x0, 0x1f, 0x77bb, 0x9, 0x1, 0xffffffff, 0xfffffff8, 0xdb, 0x9, 0x6, 0x7, 0x4, 0x4, 0x5f35, 0x8, 0xb569, 0x5, 0x7fffffff, 0x8, 0xe450, 0x3bb, 0x0, 0xea, 0x6, 0x9, 0xfffffffc, 0x3, 0x9, 0x8266, 0x1, 0x5, 0x7, 0x5, 0xfffffffb, 0x0, 0x200, 0x1, 0x7, 0x0, 0x8001, 0x80000000, 0x80000000, 0x8000, 0x359, 0x0, 0x57c, 0x8, 0x9, 0x8, 0x9, 0xfffffc01, 0x7, 0x200, 0xb2ea, 0x797, 0x9, 0x2, 0x4b262408, 0x8, 0x5, 0xdd59, 0x80, 0x2, 0x8000, 0x4, 0x3, 0x3, 0x366, 0x6, 0xff, 0x8, 0xfffffffe, 0x1f, 0x5, 0xffffff00, 0xff, 0x8000, 0xf5f, 0x3, 0x0, 0x5, 0x3, 0x400, 0x10000, 0x800, 0x3]}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x100000000}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3936}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x20cc0000000000}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_TBF={0x3c, 0x1, {0xfffffffe, 0xffffffffffffffff, 0x1, 0x80000000, 0xb5, {0x4, 0x0, 0x5, 0x0, 0x47b, 0x2}, {0x3, 0x0, 0x87a, 0x2, 0x7, 0x80000000}, 0x7fffffff, 0x3, 0x8}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xfffffff9}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x200}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x101, 0x9, 0x7, 0x1ff, 0x8, 0x401, 0x2, 0x2, 0xfff, 0x0, 0x80000000, 0x81, 0x2, 0x7, 0xff, 0x33, 0x1ff, 0x3ff, 0x2, 0x8, 0x0, 0x8, 0x3, 0x81, 0x1, 0x7f, 0x1, 0x1f, 0x2b04, 0x800, 0x2, 0x3f, 0x1, 0x1, 0x1, 0x3, 0x0, 0x8, 0x1, 0x2, 0x1, 0xf7c, 0x2, 0x7, 0x2, 0x7f, 0x8, 0x1, 0x794, 0x5, 0xfffffff7, 0x2, 0x3f, 0x401, 0x6, 0x82, 0x7fffffff, 0xfffffff7, 0x0, 0x2, 0x9, 0xffff, 0x0, 0x10000, 0x2, 0x5, 0x9, 0x6, 0x9e0, 0x4, 0x8926, 0x3, 0x3ff, 0xffffff25, 0x0, 0x8ac0, 0x1f, 0x2, 0x6, 0xfffffffb, 0x5, 0x7fff, 0x1, 0x0, 0x26d, 0x1000, 0x932, 0xff, 0x20000000, 0x6004d72a, 0x4, 0x7, 0x8, 0x1b11, 0x0, 0x2, 0x80000000, 0x6fc7, 0x17, 0x100, 0x10000, 0x6, 0x1, 0x3e, 0x7fff, 0x3, 0x9, 0x9, 0x3, 0x1000, 0x8, 0x5, 0x1, 0x401, 0x8, 0x8001, 0x76, 0xcd7, 0x2267, 0x8, 0x5, 0x9, 0x887, 0xfff, 0xec, 0x2, 0x6, 0x5, 0x0, 0x1, 0x5, 0x2, 0x80000000, 0x101, 0x1, 0xff, 0x4, 0x10001, 0x62af759e, 0x8001, 0x100, 0x8001, 0x5, 0x13a27e7b, 0x8, 0x3, 0x0, 0x6, 0x20, 0x8001, 0x63, 0x7, 0x7fffffff, 0x4dd, 0x1, 0x20, 0x7fff, 0x3, 0x20, 0x8, 0x9, 0x3, 0x9e, 0x90, 0x8, 0x10000, 0x80000000, 0x8000, 0xf809, 0x0, 0x9, 0x4, 0x80, 0x1ff, 0x3f, 0x1340000, 0xfe, 0x3ff, 0xfffffffb, 0x1, 0x4, 0x30, 0x2, 0x4, 0x5, 0x1, 0x7, 0x7, 0x8, 0x0, 0x7, 0xb63, 0x2, 0xaa3, 0x9, 0x400, 0x7, 0xfffeffff, 0x2b3, 0x2, 0x800, 0x8000, 0x6, 0x6, 0x1f, 0x8, 0x5, 0xff, 0x7, 0x0, 0x5, 0x1000, 0x20, 0x8, 0x3d5, 0x4, 0x8, 0x5, 0xff, 0x5, 0x6898, 0x0, 0x1, 0x0, 0x5, 0x5, 0x1, 0xfff, 0x1f, 0x9, 0x1f, 0x8, 0x200, 0x7ff, 0x400, 0x0, 0x84, 0x4f2, 0x400, 0x4, 0x5, 0x1, 0xff, 0x8, 0x2, 0xfffffffc, 0x3, 0x4, 0x7fffffff, 0x9, 0x7, 0x4, 0x7, 0x8, 0x2649, 0x401]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x3, 0x9ab5, 0x1000, 0x5, 0xffff, 0x7fff, 0x5, 0x2, 0xc3, 0x2, 0x3ff, 0x3, 0xbd, 0x6, 0x1, 0x8, 0x4, 0xfffff801, 0x92, 0x1000, 0x8, 0x5, 0x6, 0x4443, 0xfff, 0x7, 0x1, 0x7fffffff, 0x40, 0x5, 0x2, 0x80000001, 0x8, 0x9, 0x1f, 0x80000000, 0x0, 0x0, 0xac, 0x401, 0xffffff81, 0x200000, 0x6, 0x7, 0x3000000, 0x20, 0x6, 0x2, 0x800, 0xbb, 0x10001, 0x9, 0x7, 0x1570, 0x400, 0x4, 0x6, 0xac36, 0x3786, 0x4, 0x1, 0x0, 0x9a27, 0x6, 0xfffff001, 0x1, 0x3b, 0xffffffaf, 0x34, 0x7ff, 0x4, 0x8, 0x7fffffff, 0xffffffff, 0x6, 0x7f, 0x7e8, 0x0, 0x6, 0x5ca, 0x7fffffff, 0xc4, 0x3, 0x9, 0xffffff01, 0x101, 0x1, 0x5, 0x10001, 0xbd, 0x1f, 0x6, 0xffffff80, 0xcb6, 0x5, 0x6, 0x80000001, 0x1, 0xd1, 0x5, 0xffff, 0x1, 0xfff, 0x0, 0x3, 0x79, 0x1, 0x7, 0x8, 0x3, 0x3ff, 0x3f, 0x0, 0x4, 0x10001, 0x80, 0x8, 0x1, 0xffff, 0x2, 0xad0b, 0x7, 0xfff, 0x6, 0x8, 0x2f5, 0x0, 0x100, 0x3, 0x8, 0x781, 0x4b78, 0x6, 0x5, 0x4000, 0x7, 0x5, 0x0, 0x7, 0xff, 0x5, 0x0, 0x3, 0x81, 0x6, 0x2, 0x1, 0xb83, 0x7, 0x57f, 0x1, 0x9, 0xffffffff, 0x1, 0x0, 0x6, 0x1, 0xfffffffa, 0x80000001, 0x10000, 0x20, 0xfff, 0x172, 0x20, 0x76f8, 0x1, 0xfff, 0x4, 0x69, 0xfffffff7, 0x7fffffff, 0x1, 0x6, 0x8, 0xffffffb5, 0x9, 0x80000001, 0xa4, 0x2, 0xff, 0xf, 0x6, 0x80000001, 0x1ff, 0x4, 0x0, 0x7f, 0x1, 0x9, 0x0, 0x80000000, 0x4, 0x4, 0xffff, 0x1, 0x6, 0x6, 0x8, 0x1a96, 0x3ff, 0x8001, 0x5, 0x3f, 0x4, 0x8, 0x22, 0xee4, 0x0, 0xfffffffd, 0x82d, 0x9, 0x7b5, 0x10000, 0x7, 0xffff8001, 0xfffff12e, 0x7fffffff, 0x7fff, 0x0, 0x6, 0x10000, 0x8, 0x400, 0x8, 0x800, 0x8, 0x8, 0x28, 0x7, 0x4, 0xfffffffa, 0x80000001, 0x401, 0xfff, 0x0, 0x9, 0x7, 0x41b2f816, 0x8001, 0x1, 0x0, 0x2, 0x4, 0x9, 0x530, 0x9, 0x40, 0xfffffff9, 0x5, 0x1, 0x6, 0x1, 0x9, 0x2, 0x8]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xffff, 0x4, 0x81b, 0x101, 0x8, 0x6, 0x5, 0x4c, 0x7f, 0x3, 0x3, 0x6915, 0x2ab, 0xff, 0x101, 0x0, 0x1000, 0xfcb, 0xfff, 0xff, 0x8, 0x9, 0x0, 0x1, 0xb3, 0x3f, 0x3, 0x5, 0x100, 0x4, 0x1, 0xd1, 0x0, 0x7ff, 0x1, 0x2, 0x5, 0x122, 0xf8b, 0xcdc, 0x16f7, 0x8, 0xe81, 0x9, 0x3, 0x7be, 0x7fff, 0xb1b, 0x3, 0x100, 0x2, 0x73b, 0x2, 0x101, 0xfffeffff, 0x24, 0x3f, 0x9, 0x5, 0x401, 0x2e, 0x1ff, 0xffff0000, 0x3, 0xfff, 0xec0, 0x82, 0x49d, 0x9, 0x8, 0x1000, 0x6, 0x80000000, 0xf053, 0x7, 0x0, 0xff5, 0x0, 0x401, 0x80000000, 0x101, 0x5, 0xffffff00, 0x7ff, 0x7, 0xf7bc, 0x9, 0x9, 0x4, 0x2, 0x755d, 0x6, 0x8, 0x7, 0xffffff80, 0x7, 0x6, 0x3f, 0x0, 0x3, 0xf2, 0x1e23, 0x101, 0x1, 0x3, 0x88, 0x6, 0x10001, 0x3, 0x3, 0x20, 0x6, 0x101, 0x2, 0x2, 0xfffffff8, 0x0, 0x6e43, 0x0, 0x67b, 0x8, 0x1, 0x80000001, 0xa6c3, 0x0, 0x5, 0x3, 0x5, 0x1c, 0xffffd434, 0x7, 0x7fff, 0xcf74, 0x81, 0x8, 0x7, 0x90000, 0x0, 0x7, 0x8, 0x5f3, 0x1, 0xbe, 0x8001, 0x2601, 0x3c89, 0x40, 0xea, 0x7f, 0x0, 0x40000000, 0x2, 0x2, 0x5, 0x2, 0x3ff, 0x0, 0xcfc, 0x1, 0x70, 0x0, 0x8, 0x8, 0x8, 0x1b1, 0xffc3, 0x400, 0x7, 0x6, 0x5, 0x10001, 0xffff, 0x9, 0x20, 0x5, 0x1, 0x0, 0xb960, 0x3, 0x2, 0x9, 0x7, 0x7a3, 0x7ff, 0x1, 0x101, 0xc1e, 0x0, 0x5, 0x2, 0x406fa479, 0x59, 0x80000000, 0xb973, 0x7e, 0x4, 0x3ff, 0x1, 0x0, 0x2, 0x8, 0x2, 0x4, 0xff, 0x3, 0x401, 0x7, 0x6, 0x6, 0x3, 0x10000, 0x6a, 0x1, 0x6, 0x4, 0x100, 0x1000, 0x6, 0x7, 0x2, 0x9, 0x4, 0x1000, 0x1, 0x0, 0x9, 0x509, 0x3, 0x1, 0x0, 0x8, 0x20, 0x1, 0x5, 0x4, 0x5, 0x4, 0x401, 0x8, 0x1, 0x9, 0x5, 0x2, 0x2, 0x4, 0x8, 0x0, 0x0, 0x6, 0xff, 0x5, 0x90, 0x1afc00, 0x3, 0x401, 0x5]}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffe01, 0x7fffffff, 0x0, 0xd, 0x7, 0x8, 0x1, 0x7, 0xe03, 0x1, 0xd211, 0x8, 0x0, 0x3, 0xffffffff, 0xfffffff8, 0xfe, 0x3, 0x6, 0x1f, 0x4, 0x3, 0xc59, 0x5, 0x4, 0x0, 0x2, 0x401, 0x3, 0x9, 0x7fffffff, 0xa3, 0x0, 0xffff, 0x1, 0x5, 0xd8f, 0x1, 0x800, 0x96, 0x10000, 0x4, 0x9, 0x80, 0x3f, 0xfffff000, 0x6, 0x80, 0x80, 0x5, 0x2, 0x0, 0x0, 0x3, 0x1f, 0x7, 0x4, 0x3f, 0x7, 0x3f, 0x80000000, 0x43a2, 0x80000001, 0x0, 0x7fff, 0x3f, 0x60c, 0x9, 0xffff, 0x8, 0x3ff, 0x9, 0x0, 0x37, 0x3, 0xfffffff9, 0x7fffffff, 0x8000, 0x80, 0x7, 0x0, 0x101, 0xffffffff, 0x2, 0x11, 0x80000000, 0x2, 0x81, 0x7fffffff, 0x8c3, 0x0, 0x6, 0x9, 0x5, 0x3, 0x101, 0x3ff, 0x9, 0xada, 0x9, 0x60e9, 0x7fff, 0x101, 0x3f, 0x4, 0x9, 0x0, 0x9b29, 0x9, 0x0, 0x9c9, 0x9, 0x800, 0x8, 0x7, 0x9, 0x9, 0x2, 0x8, 0xffff, 0x9, 0x1, 0x8, 0x10001, 0x9, 0x5, 0x40, 0x1000000, 0xfffffffb, 0x7f5482d6, 0x5, 0x9, 0x29, 0x2c, 0x6, 0x9, 0x7, 0x20, 0x7, 0x40, 0x1f, 0x1, 0x6cf6c03f, 0x3ffc, 0x7, 0x40000000, 0x1, 0x6, 0x7, 0x7, 0x8, 0x7ff, 0x3d, 0xfb17, 0x5, 0x20, 0x3ff, 0x2, 0x6, 0x10001, 0x1, 0x4, 0x8, 0x200, 0x6, 0xfffff342, 0xd29c, 0xffffffff, 0xcb, 0x1f, 0x101, 0x8000, 0x98ba, 0x101, 0x2, 0x5, 0x7, 0x2, 0x1, 0x1, 0x0, 0x80000000, 0x8000, 0x3, 0xffffff00, 0x4, 0x7bcc, 0x40, 0xffffffaf, 0x6a8, 0x4, 0x7f, 0x7eba545b, 0x2, 0x5, 0x0, 0x1, 0xb3a, 0x5, 0x1ff, 0x7f5, 0x9, 0xffffffff, 0x8ac, 0x7c6d, 0x7, 0x3, 0x0, 0x0, 0x5, 0x2, 0x4, 0x3, 0xffff5492, 0xc, 0x1, 0x4, 0xfffffffe, 0x9, 0xffffffff, 0x2, 0x6, 0x8, 0xce9, 0x7, 0x1, 0x5, 0x9, 0x6, 0x2, 0x800, 0x5, 0x37e, 0x848, 0x7, 0x9, 0x2, 0x40, 0x8, 0x6, 0x3f, 0x1, 0x6f, 0x3, 0x4, 0x3f, 0x4, 0x0, 0xfffffffe, 0x1f, 0xffff, 0x0, 0xc22, 0x7fffffff, 0x1, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1ff, 0x7, 0x80d7, 0xbfd, 0x9, {0x6, 0x0, 0xfffd, 0x6, 0x3ff, 0x81}, {0x5, 0x2, 0x1f, 0x5, 0x8, 0x1}, 0x7ff, 0x141, 0x9}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xff, 0x81, 0xd2, 0x8, 0x10001, 0x6, 0x10001, 0x0, 0x80000000, 0x1, 0x10001, 0x5, 0x6, 0x10000, 0x2, 0x7fff, 0x6, 0x5b2db0a3, 0xcf, 0x2, 0xf71, 0x4, 0x6, 0x2e, 0x7, 0x8, 0x10000, 0x401, 0xb2a, 0x8, 0x8001, 0x80000001, 0x800, 0x7fffffff, 0x10001, 0x57, 0xffff1168, 0x2, 0x3, 0x2, 0x8000, 0x9, 0x10001, 0x8, 0x401, 0x0, 0xda, 0x4, 0x6, 0x9, 0x1, 0xe97, 0x80000000, 0x4, 0x2, 0x3, 0xe54, 0xf1, 0x7ff, 0x10001, 0x7d3, 0xff, 0x8, 0x9, 0x9, 0x8, 0x6, 0x8000, 0x0, 0x1, 0x7, 0x6, 0x101, 0x9, 0x80000001, 0x8, 0x20, 0x7, 0x8, 0x2, 0xd, 0x4, 0x7, 0x1, 0x101, 0x2, 0xff, 0x8, 0x9, 0x8, 0xffff, 0x8000, 0x7, 0x9, 0x1ba, 0x7, 0x1, 0x1ff, 0x0, 0x3, 0x4, 0x6, 0x2, 0x8, 0x9165, 0x4, 0x0, 0x4, 0x9, 0x7ff, 0x3, 0x1, 0x400, 0x800, 0x93d3, 0x8a, 0x3, 0x40, 0x7, 0x10000, 0x5f11, 0xad, 0x8000, 0x7, 0x7fffffff, 0xc2, 0x80, 0xdd, 0x7, 0x5, 0xb948, 0x4, 0x6, 0xfffff800, 0x401, 0x4, 0x9, 0xb, 0x2, 0x8, 0x9, 0x4fd, 0x1, 0x5, 0x800, 0x4, 0x7, 0x10001, 0x6, 0x1, 0x2, 0x1ff, 0x6, 0x40, 0xffffbfc3, 0x9, 0x7, 0x1000, 0x5, 0x2, 0x5, 0x1, 0xac, 0x348, 0xffffffff, 0x8, 0x9, 0x100, 0xfff, 0x3, 0x8cc, 0x4, 0x4e5, 0x3ff, 0x9, 0xf2a5, 0x2, 0x7, 0x7, 0x2, 0x881, 0x1, 0x9, 0x0, 0x2, 0x3, 0x3, 0x8001, 0x10000, 0x3f, 0x80000001, 0x4, 0x80000000, 0x401, 0x8, 0x6, 0x3, 0x7f, 0x3, 0x25fb6760, 0x3, 0x101, 0x6, 0xffffffe0, 0x7, 0x3, 0x8, 0x4, 0x1, 0xffffffff, 0x80, 0x6e1, 0x3, 0x8, 0x81, 0x7ff, 0x8, 0x8, 0x8001, 0x80000001, 0x3, 0x0, 0xfffeffff, 0xfffffbff, 0x6, 0x8, 0x5, 0x0, 0x609, 0x9, 0x4, 0x40, 0x7, 0x9, 0x10000, 0xce86, 0x71d, 0x2, 0x3, 0xa3, 0x9, 0x6b, 0x9, 0x272f, 0x1000, 0x4, 0x3ff, 0x3, 0x8, 0x2bc, 0xfffff001, 0xf7d7, 0x7, 0x5, 0x7, 0x3]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x654, 0x6, 0x7ff, 0x7, 0x4, {0x9, 0x1, 0x0, 0x8, 0x4, 0x5}, {0x0, 0x2, 0x4, 0x200, 0x3f, 0x7}, 0x713, 0x9, 0x3}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xfffffffffffffc00}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x400}, @TCA_POLICE_RESULT={0x8, 0x5, 0x5}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x1, 0x6, 0x6, 0x7, {0x40, 0x0, 0x840c, 0x200, 0x2, 0x8}, {0x3, 0x1, 0x3, 0xd806, 0x5, 0x2}, 0x81, 0x5, 0x9}}, @TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff8, 0x3, 0x730add4c, 0x3f, 0xc5, {0x0, 0x0, 0x1f, 0x1, 0x402f, 0x1ff}, {0x5, 0x1, 0xfc59, 0x5, 0xfff, 0x9}, 0x6, 0x10000, 0x101}}], [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x12a0}], []]}, {0xed, 0x6, "ad174963e48e3587df6e13d535486b25f5919b839474869f1c5c02c7c42591c2c6fcea922d7da44b2e4a6c83450fba858bb4d0488cec4e626ad3b05f9729bf1eddef556551cf511a5074803d06868abc9d66defd05af843902b4b29477b98b272937b22f9890546904af117b145aa45a0230913e4eab7a109721298efa44eb5383b777835c9d6e52a1552589b2d5328455968918add7a4c094dab92f5a5a75c1f1dee4727761bc2ce934e16fc46ef81cd2a5ac41d7a7ad19932c31b1a10888c64e1e2b48495e4a7620f03e9997fadb1605c3f37cafcc295b518771f3ddf785b05324b6cd9d9f4a7695"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mirred={0x1f4, 0xe, 0x0, 0x0, {{0xb}, {0xe4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0xfff, 0x5, 0xffffffffffffffff, 0x0, 0x6}, 0x4, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x1, 0x5, 0x20, 0xfffff000}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0xe, 0x10000000, 0x5, 0x6a}, 0x4, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xffff, 0x6, 0x6, 0x7, 0x1000}, 0x3, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x81, 0x6, 0x7, 0x9, 0xa1}, 0x3, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xddb, 0xfffffffe, 0x5, 0x80000000, 0xa3}, 0x3, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x6, 0x5, 0x2, 0x2}, 0x1, r4}}]}, {0xe8, 0x6, "64a6c3f6c0ce9811627124f5c35db6fc883dfa884f157087e3c662bb8503e2f9ffc6367ce4ef3e33f779bf4e9aec882181b2c3a4d57fb1575b518dd67fcced39102e294d4efde0f2d78569490bde798ebc7cd6c8c8f170a9eda20be8bb77966c5ba7e353c3bda216728d7ff77ad4679bf313892b3d18e12489978e3eb2967bd8cc08559e038088fb3034eb282eecc24907a5dfffb72c64c36924c0ab19f992d38c826b343938403489ba187c705132ede23da5f1352fff91dd18e31295d713ab1cbca50fea63efa21074aebcbb9945d26808268b9b8ad6fa2dc94a9707f3017851f71511"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x61901c192067c7da, 0x1}}}}, @m_ife={0xc8, 0x19, 0x0, 0x0, {{0x8}, {0x68, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_DMAC={0xa, 0x3, @remote}, @TCA_IFE_METALST={0x24, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x3}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0xfffffc01}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x3, 0xcb, 0x2, 0x7d, 0xdf02}, 0x1}}, @TCA_IFE_DMAC={0xa}]}, {0x3b, 0x6, "b625dd9bc19ccfe358478bdceb741a7697c6453a406414fc880c4316fb36f345a74432f1c82adbf73f2153f8d2432853cae17dd2262cc3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x4}}}}, @m_sample={0x13c, 0xf, 0x0, 0x0, {{0xb}, {0x14, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x80000000}, @TCA_SAMPLE_RATE={0x8}]}, {0x100, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0x160, 0x9, 0x0, 0x0, {{0x8}, {0x6c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r7}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x4}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x10000, 0x9, 0x1, 0x2, 0x401}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1000, 0x7, 0xffffffffffffffff, 0x7fff, 0x1f}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0xffff, 0x20000007, 0x7ff, 0x9}}]}, {0xd0, 0x6, "b9b65188cf52725387c23ff79da19fe981305b908b0cf0dfbbac82fbdfbc3aac352f2c42758752cbc00816d3a2eed646e5551d51ed656556211bf8d2cfbb7379a28e2e875383e1e0bc727370e58b05eb235aa196071340588f2f18eced57309fc1bf303dcc3b95997b0ad7fca50f5d56c64d51cda253004e5b02b81fb6c6b4a72c16e866da69c8f8638917be8d535b0df3e01f511bad612cbbeb53c03a564d232febddf736f46d86fc52c6f3b73fdd0be01527edd7318298c8d833d7718ccb336c24c150593c92b2fe70f6fe"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_connmark={0xa0, 0x5, 0x0, 0x0, {{0xd}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8001, 0xe17, 0x0, 0x16e, 0x4}, 0x3f}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x400, 0x7, 0x1, 0x7fff}, 0x40}}]}, {0x37, 0x6, "2a748e5c3f033befc9c59402d04504dd6bb6a4da0404a9bffb34769681a94ecea02ac10b63f89a50618a74480e930283b77519"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_sample={0xa8, 0x4, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x2}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x7ff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1}]}, {0x61, 0x6, "eafe3cfc80806eeaca468b374e1b13c25bd78b460f7ec03a6a417ef45c1fc1fea542faec1751f22bf460f20182d49e4059982be6b98af6898e3c00fb7066b6ddc380447b6e9844c03a4fcd65d743b23fa311a5a19fb40a370d3225ec1c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_tunnel_key={0xe4, 0x14, 0x0, 0x0, {{0xf}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}]}, {0xaa, 0x6, "7edc62ad73ea239faf48e92b221f7f2550fad4c9c63d7ad2c74d5b14388551feb5f7215333e5677ade2d6ba1fe33c135d73cab00e781990a11b9c7581721845229ba516f8d6932d76955a91a726d2309295af62d2740e40801422974abb75159adb7594853939cc8436e1d2a525a7081760524a929c6593cc430b3c05e79cadf6d790f7f9dab8b330b63b89c49f4a78e03ce4d98b173fc1539f8b4c8c20cff8fa91626f1a8f0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0xa358}}, 0x44004) [ 769.339224][ T7455] team0 (unregistering): Port device team_slave_0 removed [ 769.423627][ T7455] team0 (unregistering): Port device team_slave_1 removed 00:41:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd", 0xac}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x204000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000120081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2\x17.:u\x810.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x88\xfd\xd7\xb0\x94\x82t\x96\r2x\xc5\x9b\x8c\x9dr\a\x051\xff\x9ci\x88\xae\xee\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xef[x\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\'\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03', 0x3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0x10001) fcntl$addseals(r1, 0x409, 0x8) r3 = epoll_create(0x20) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x810, r3, 0xd4a14000) sched_setattr(r2, &(0x7f0000000000)={0x38, 0x5, 0x20, 0x6, 0xcf, 0x3, 0x1, 0x6, 0x4, 0x2}, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 00:41:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x219000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000130081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x300000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x319000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x400000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000002140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd", 0xac}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x500000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000003140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x600000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x604000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000004140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x700000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000008140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x800000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9d", 0xad}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x900000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="3900000f140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xa00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000060140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xb00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000150081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xb18000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xc00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9d", 0xad}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000100081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xd00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xe00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) [ 772.505740][ T9262] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9262 comm=syz-executor.5 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xf00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1000000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1100000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000120081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1200000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9d", 0xad}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1518000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000130081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x1718000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x2000000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5300}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000150081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x2010000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x2200000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140281ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) [ 773.614733][T10221] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=532 sclass=netlink_tcpdiag_socket pid=10221 comm=syz-executor.5 00:41:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x2218000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5803}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140381ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x2500000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) [ 774.278829][T10421] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=788 sclass=netlink_tcpdiag_socket pid=10421 comm=syz-executor.5 00:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x3018000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x3418000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:41:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x3f00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:41:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140481ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:41:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055c80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "487870f969b635"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056c80)={0x0}) r13 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r13, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r16}, {r15}, {}, {r15}, {}, {}, {0x0, r16}, {}, {0x0, r16}, {}, {}, {}, {0x0, r16}, {}, {r15}, {}, {}, {}, {}, {}, {r15}, {0x0, r16}, {0x0, r16}, {r15}, {0x0, r16}, {r14}, {}, {r14}, {0x0, r16}, {}, {}, {r14, r16}, {}, {}, {0x0, r16}, {r15, r16}, {}, {r14, r16}, {}, {0x0, r16}, {r15}, {}, {}, {}, {0x0, r16}, {r15}, {}, {}, {0x0, r22}, {r21, r16}, {}, {}, {}, {r14}, {}, {}, {}, {}, {0x0, r23}, {r24, r16}, {0x0, r16}, {0x0, r16}, {}, {}, {0x0, r16}, {}, {r14, r16}, {}, {}, {}, {}, {0x0, r16}, {}, {r15}, {r14}, {r25}, {r15}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {0x0, r16}, {r14, r16}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {r15}, {r14, r16}, {}, {}, {r15}, {}, {0x0, r16}, {}, {}, {}, {}, {r14}, {}, {0x0, r16}, {r14, r16}, {0x0, r16}, {r15, r16}, {}, {r19}, {}, {r14}, {}, {0x0, r16}, {}, {r14}, {0x0, r16}, {}, {}, {0x0, r16}, {0x0, r16}, {0x0, r16}, {r15, r16}, {}, {0x0, r16}, {}, {}, {}, {r14}, {r15, r16}, {0x0, r16}, {}, {}, {r15}, {r21}, {0x0, r16}, {}, {}, {r15}, {r14}, {0x0, r16}, {}, {}, {0x0, r16}, {}, {}, {r15}, {0x0, r16}, {r15}, {}, {}, {}, {}, {}, {r14, r16}, {r15, r16}, {}, {0x0, r16}, {}, {r15}, {0x0, r16}, {}, {}, {}, {}, {}, {0x0, r16}, {r15}, {0x0, r16}, {}, {}, {}, {0x0, r16}, {}, {0x0, r16}, {r14}, {0x0, r17}, {}, {0x0, r18}, {}, {}, {r15}, {r14}, {}, {}, {}, {0x0, r20}, {0x0, r16}, {}, {0x0, r16}, {}, {}, {r15}, {0x0, r16}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {r14}, {}, {r15}, {}, {}, {r15}, {0x0, r16}, {}, {r14, r16}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {r14, r16}, {}, {}, {r15}, {r14, r16}, {}, {}, {}, {r15}, {r15}, {r14}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000056e80)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x23, "7f4154ba7fe4cd"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057e80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {r12}, {}, {}, {}, {r15, r26}], 0x9, "77b3950a636028"}) r27 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r27, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r28 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r28, 0x4c82) [ 774.476888][T10846] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1044 sclass=netlink_tcpdiag_socket pid=10846 comm=syz-executor.5 00:42:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4000000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f0000000140)) 00:42:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140881ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x74}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r3}, {r2}, {}, {r2}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {}, {r2}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {0x0, r3}, {r2}, {0x0, r3}, {r1}, {}, {r1}, {0x0, r3}, {}, {}, {r1, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {r1, r3}, {}, {0x0, r3}, {r2}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {0x0, r9}, {r8, r3}, {}, {}, {}, {r1}, {}, {}, {}, {}, {0x0, r10}, {r11, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {0x0, r3}, {}, {r1, r3}, {}, {}, {}, {}, {0x0, r3}, {}, {r2}, {r1}, {r12}, {r2}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {r1, r3}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {r2}, {r1, r3}, {}, {}, {r2}, {}, {0x0, r3}, {}, {}, {}, {0x0, 0x0}, {r1}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r2, r3}, {}, {r6}, {}, {r1, 0x0}, {}, {0x0, r3}, {}, {r1}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {}, {}, {}, {r1}, {r2, r3}, {0x0, r3}, {}, {}, {r2}, {r8}, {0x0, r3}, {}, {}, {r2}, {r1}, {0x0, r3}, {}, {}, {0x0, r3}, {}, {}, {r2}, {0x0, r3}, {r2}, {}, {}, {}, {}, {}, {r1, r3}, {r2, r3}, {}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {}, {}, {}, {}, {0x0, r3}, {r2}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {r1}, {0x0, r4}, {}, {0x0, r5}, {}, {}, {r2}, {r1}, {}, {}, {}, {0x0, r7}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {r2}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {r1}, {}, {r2}, {}, {}, {r2}, {0x0, r3}, {}, {r1, r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {r1, r3}, {}, {}, {r2}, {r1, r3}, {}, {}, {}, {r2}, {r2}, {r1}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000004ed40)={{0x0, 0x1, 0x7, 0x10001, 0xaa4f, 0x6, 0x3, 0x8a, 0xfffffffc, 0x1, 0x3, 0x3, 0xb2b, 0x7, 0x80000001}}) r16 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r16, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r19}, {r18}, {}, {r18}, {}, {}, {0x0, r19}, {}, {0x0, r19}, {}, {}, {}, {0x0, r19}, {}, {r18}, {}, {}, {}, {}, {}, {r18}, {0x0, r19}, {0x0, r19}, {r18}, {0x0, r19}, {r17}, {}, {r17}, {0x0, r19}, {}, {}, {r17, r19}, {}, {}, {0x0, r19}, {r18, r19}, {}, {r17, r19}, {}, {0x0, r19}, {r18}, {}, {}, {}, {0x0, r19}, {r18}, {}, {}, {0x0, r25}, {r24, r19}, {}, {}, {}, {r17}, {}, {}, {}, {}, {0x0, r26}, {r27, r19}, {0x0, r19}, {0x0, r19}, {}, {}, {0x0, r19}, {}, {r17, r19}, {}, {}, {}, {}, {0x0, r19}, {}, {r18}, {r17}, {r28}, {r18}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {0x0, r19}, {0x0, r19}, {r17, r19}, {}, {}, {0x0, r19}, {}, {}, {}, {}, {r18}, {r17, r19}, {}, {}, {r18}, {}, {0x0, r19}, {}, {}, {}, {}, {r17}, {}, {0x0, r19}, {r17, r19}, {0x0, r19}, {r18, r19}, {}, {r22}, {}, {r17}, {}, {0x0, r19}, {}, {r17}, {0x0, r19}, {}, {}, {0x0, r19}, {0x0, r19}, {0x0, r19}, {r18, r19}, {}, {0x0, r19}, {}, {}, {}, {r17}, {r18, r19}, {0x0, r19}, {}, {}, {r18}, {r24}, {0x0, r19}, {}, {}, {r18}, {r17}, {0x0, r19}, {}, {}, {0x0, r19}, {}, {}, {r18}, {0x0, r19}, {r18}, {}, {}, {}, {}, {}, {r17, r19}, {r18, r19}, {}, {0x0, r19}, {}, {r18}, {0x0, r19}, {}, {}, {}, {}, {}, {0x0, r19}, {r18}, {0x0, r19}, {}, {}, {}, {0x0, r19}, {}, {0x0, r19}, {r17}, {0x0, r20}, {}, {0x0, r21}, {}, {}, {r18}, {r17}, {}, {}, {}, {0x0, r23}, {0x0, r19}, {}, {0x0, r19}, {}, {}, {r18}, {0x0, r19}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r19}, {}, {}, {r17}, {}, {r18}, {}, {}, {r18}, {0x0, r19}, {}, {r17, r19}, {}, {}, {}, {}, {}, {}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {r17, r19}, {}, {}, {r18}, {r17, r19}, {}, {}, {}, {r18}, {r18}, {r17}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {r17}], 0x0, "2156816c73038c"}) r29 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r29, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r32}, {r31}, {}, {r31}, {}, {}, {0x0, r32}, {}, {0x0, r32}, {}, {}, {}, {0x0, r32}, {}, {r31}, {}, {}, {}, {}, {}, {r31}, {0x0, r32}, {0x0, r32}, {r31}, {0x0, r32}, {r30}, {}, {r30}, {0x0, r32}, {}, {}, {r30, r32}, {}, {}, {0x0, r32}, {r31, r32}, {}, {r30, r32}, {}, {0x0, r32}, {r31}, {}, {}, {}, {0x0, r32}, {r31}, {}, {}, {0x0, r39}, {r38, r32}, {}, {}, {}, {r30}, {}, {}, {}, {}, {0x0, r40}, {r41, r32}, {0x0, r32}, {0x0, r32}, {}, {}, {0x0, r32}, {}, {r30, r32}, {}, {}, {}, {}, {0x0, r32}, {}, {r31}, {r30}, {r42}, {r31}, {}, {0x0, r32}, {}, {}, {}, {}, {}, {}, {0x0, r32}, {0x0, r32}, {r30, r32}, {}, {}, {0x0, r32}, {}, {}, {}, {}, {r31}, {r30, r32}, {}, {}, {r31}, {}, {0x0, r32}, {}, {}, {}, {}, {r30}, {}, {0x0, r32}, {r30, r32}, {0x0, r32}, {r31, r32}, {}, {r36}, {}, {r30}, {}, {0x0, r32}, {}, {r30}, {0x0, r32}, {}, {}, {0x0, r32}, {0x0, r32}, {0x0, r32}, {r31, r32}, {}, {0x0, r32}, {}, {}, {}, {r30}, {r31, r32}, {0x0, r32}, {}, {}, {r31}, {r38}, {0x0, r32}, {}, {}, {r31}, {r30}, {0x0, r32}, {}, {}, {0x0, r32}, {}, {}, {r31}, {0x0, r32}, {r31}, {}, {}, {}, {}, {}, {r30, r32}, {r31, r32}, {}, {0x0, r32}, {}, {r31}, {0x0, r32}, {}, {}, {}, {}, {}, {0x0, r32}, {r31}, {0x0, r32}, {}, {}, {}, {0x0, r32}, {}, {0x0, r32}, {r30}, {0x0, r34}, {}, {0x0, r35}, {}, {}, {r31}, {r30}, {}, {}, {}, {0x0, r37}, {0x0, r32}, {}, {0x0, r32}, {}, {}, {r31}, {0x0, r32}, {}, {0x0, r32}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r32}, {}, {}, {r30}, {}, {r31}, {}, {}, {r31}, {0x0, r32}, {}, {r30, r32}, {}, {}, {}, {}, {}, {}, {}, {0x0, r32}, {}, {}, {}, {}, {}, {r30, r32}, {}, {}, {r31}, {r30, r32}, {}, {}, {}, {r31}, {r31}, {r30}, {0x0, r32}, {}, {}, {}, {}, {}, {}, {r30}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004fd40)={0x0, 0x0, "a8605c48388574bb5c44ff424e50f28602a9c94e7bf05de7407a212449b71c527db65116b8fa3ca6dd752e2d7aeabcc45e3d777c333eacc38f9eceb144f5fb0eed5e3007dbc1e588a1b58c1b5dda16d186d7cbe76c11fdb60a73d88afe5fac3b1acdc3f4cc24b56d545097b06a208dc3d7ef1a239b1c98bdb1ed6b858b2bc99c7d9efe618b75ca6134c7e64f9b5dbe18e068440a57ef9c35c02f6ece40951a18e002a2173993f99362d23425ae5069d66ead1ca01281b0da74885e044171da59cd403fa83eb448d6829daba9bc793b1780c4943881e82b6052c5b5a089d3cb7d9128cbda973690d3dd9c3a51992a59958264f70ed66aa025fdf83fdf25112179", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000050d40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "0f7706d0a1216e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051d40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6, "73defd285023a8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052d40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r44}, {}, {}, {}, {}, {}, {}, {0x0, r33}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r46}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x80, "95e82a7fb34ee1"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053d40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r15}, {r18}, {r31, r43}, {r45, r47}, {r48}], 0x1, "7ff645ad352055"}) 00:42:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4000080000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 775.130704][T11050] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2068 sclass=netlink_tcpdiag_socket pid=11050 comm=syz-executor.5 00:42:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4102000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x6}, [{0x0, 0x0, 0x3, 0x8}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:00 executing program 3: syz_emit_ethernet(0x92, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @void, {@ipv4={0x800, @icmp={{0x1a, 0x4, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1, {[@timestamp_prespec={0x44, 0x54, 0xae, 0x3, 0x7, [{@multicast1, 0x4}, {@multicast2, 0x776c}, {@loopback, 0x48800000}, {@private=0xa010101, 0xe00}, {@local, 0x3}, {@rand_addr=0x64010102, 0x81}, {@local, 0x400}, {@private=0xa010101, 0xffff7fff}, {@local, 0xab48}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x714}]}]}}, @dest_unreach={0x16, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty}}}}}}, 0x0) 00:42:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140f81ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) [ 775.270556][T11583] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3860 sclass=netlink_tcpdiag_socket pid=11583 comm=syz-executor.5 00:42:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b872981f3c341502dc2", 0xf8}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4202000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @local, 'batadv_slave_1\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="6093639c8c1e598942ace55b354be92d4da2c1fb955a36a1cb783e249aadb1dc035a490dc47b1a89c8773c384948e5768bdd58191a27eeda533c7a4d41f162e966b79a2e58244c41382a230ed22c9e965953f201002fb248b11ebe59ffd608f5052ebd29b49a059ea1a1a79e12b2ae5439575319b6ede0a14e8814ccbe59a8e8e353", 0x82}, {&(0x7f0000000040)="284bc3b4e1267386dc2330066970f09c", 0x10}, {&(0x7f0000000240)="7cc8b3559c910ec5e19b52c99925ed82e49716e634a068bbafa7c97844f0b92266150df655553ecb947af5096a0755fa673dbc2915dcec2ce1e9836a39b0ed9e7fbf0c6c87a268ae0feed1492ed4909c43f7086f5f91b7b7c7e0501638b76654c875a3921b628ff4c825ae62", 0x6c}, {&(0x7f00000002c0)="e35d75797229e5f44fdc3a83add5f58bae3813338c09a2f4776149f06197054147e7f42215c5a91a1b34808aff8e9e6a0a5550173db7ca582c12a4ee87cdc02b03ae7217b80b5c5fcf43483418950ec1e004b6cd32ef9eb9a65c7a", 0x5b}], 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x3268}}, {{&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x400, @private0={0xfc, 0x0, '\x00', 0x1}, 0x400, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000400)="2917e09cf7a134bcc9ebb0f2d1a558508191be5ec7289b2e2a1302dd745d0d0be92fdfef50fa8fc67b4e33e0166ff8ae3b7f856de2313dddb8528b4607c07bd3eeebacbdef50f13dfce4baaa48027ef5063a898d1bc86a3f37c1fef32e222593c6d099ec19b8e4fe202fc6aced7990ff65877da0ea44941d0fd08c808bde1a1c09992c7b1c15c14da9adb848451dac4f9d53415e7c969ebf5cfb10d8d8ad404a0f62ff21b82cbf931fa745d8", 0xac}, {&(0x7f00000004c0)="ac88a09541d6007d781665d2c68bafb0ab8bb45a7e7fb96de785c88f457c1adc41390d2bc2d77945cbe859a54057681129acd07755afb854e7bfa76a127a76ffd1afd8ec6f03c093acb34e9beea5ae97f336849b423d305f9503f775223affaa4c8dc5c0170d530c07", 0x69}, {&(0x7f0000003c80)="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", 0x1000}, {&(0x7f0000000540)="99fa3dc0dda30213c8d5050f8ffcac39cc7e507fbd4f82a1e123a58a907a7a", 0x1f}, {&(0x7f0000000580)="2e04ab93a61a2a7fceec2ee565e3fa42a6c04eeac7d3b968640c544993ff9e5aaed95161169a09ac1d11f157b357d8ed70ba35904810579041dc464fca45832542097e56abc3d3d7432c7a551c7b2b8893ae7fa46ee103d1f093747e849897dfbca3d847e306a3e5710e423df5774ccb9ca0b3cf11e0e66f4f9ee8305d552b19343977e9ceb0b8e708fa39d3fe05dc7817c2a9c19faeafa637243b04f824a22485f95db85bd5485d06dde27fdb2c61e29937d0d06128190e943dedcd147f2ca3d1fd7fbc21ffe0e541eff83d1374f69e0a7d09de8552fe69747c0c034b73febf4e5c8d9d70d1ac3da3f9036a7e521afa8e22c2ae", 0xf4}, {&(0x7f0000004c80)="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", 0x1000}], 0x6}}, {{&(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x0, 0x1, 0x2}}, 0x80, &(0x7f0000005f80)=[{&(0x7f0000000840)="450eedea4e41b04756d97455a1e7da3a8f456ecca59f58498bbd759dcdca8bac03c21cc220b70707b547a875f318c8f9a1f6cbb32facfff6686272ab0d65ad9a3c994de603d87e0cc85b38e046c940748fe60919ed833c3a342f95d85a387808d0613f1948146c487043bc66dfcc387f7fa2f4c32b85b5a6c968d967e1e4fdfdfa55a64698d7e9be59e1161ed02a8702244d8dab153acf1bb81f5acf9cedfe157ffbcf881da6b42ce614c28fbe64d3b5d4486ecd3aaca2616334d2685713a47a52cc632a7cf0b78207ff6ecde36fbc8c0770211a5844a8527b219be4daa38dd71093326529110d7d0911a242d5", 0xed}, {&(0x7f0000005c80)="9ac50e5ab85203620e19b4814e4feb4f60df637614de8d219e4e82530f68456e6284a577d711df6eb7c6b550a99ff6fd04335eb52e512c17dc7c90329644347f0d457aecfc6b3b943de4745b71078a2e1f80ec14feb3b85242e3b01462be99761ce40deebea369b0d6902e3ceda7af09e58b31d8dc0c459fb3f728f925395a38eb9de702a077039f0e1c0603fa4ef2de93b3869496f0dc557301f149140bb520fbd8f5c2df2ef03ad4cad340408eeb31774fb4114223b8ca", 0xb8}, {&(0x7f0000005d40)="33fae0151399a4769ec5652177b5b5f96dd876cc2f2c038b24768f9f0b683d7ea25ebd7d20dbb6ce64d6ccd0fb97f2117774fefeafc53aab708d88ab1e4ca25da05f263b46015af0a82f6c10d8b7f2bde35f0251e40e86c33cda5814a6d288f42b15fcc8a2cb527a8514f3a0e230f45d4de100c04e08b9ea620fe8ced11bbaae04b50b34e99c31428132ffabf5b6680774e214fe00959a589198fb2a309ef7a6b1f79ebba53ce6a21389fa613e7236500874b4ab", 0xb4}, {&(0x7f0000000940)="ce5c306eeac0894be6", 0x9}, {&(0x7f0000005e00)="e13e4e5358d6773556d15c2894f6c4b0e65efb075f08baa77eb9e7b692f91cc24894d45e66b54195e745b8e6adfeafc2a5f2b949bef89b5e3ab8960caa190a80027a188169a1947f5eecf9f5330f6c73e9e674d9bdbfb231ae92ba711bd93911f54cd220c6b6aa2b35687441a460865cba777582fd673cc08b2addae10e1a1fb0023fc52e6c1aa5da4643da772fa8d5e3bbb42d0e20e4ee498f6ec7a827b4832b8262c7d53fee87cb977dba4f04c3eb9761a6e2e7cf776cb75a7e19ec241bd9d8dc8bf2ad443a6", 0xc7}, {&(0x7f0000005f00)="f3b69e89a742e3447cce976b933f7cb50659abddaff7cc99c5a4f410e39c5e39495279f401e3ed1b84a05cb7f1161c008df58a6071ba220d642a81a66e0fdda1863e9c906f1ac5e672", 0x49}], 0x6, &(0x7f0000006000)=[{0x108, 0x116, 0x1ff, "5c73f53bbc9d5c120301a7f16814c1726569fae8292868fa0fbc4938c2d6c7377c9c050e1149c44997c0b989e7064a5946adda1f11e421ef5848c6abd5835cdc5e37b6d1bcafc17516282cef88ff58b55ca78781a86a658bb96c3c7db54f6a44dd952cfa5ff4b0ee51708c2d7873b06429e4632704bff1da6cdaa271d55fb86fa873705b4eace6e75af11562e429b8a2c98d888822b55a474f09bcd952d13d9253c446c70d9af3153740bc4c53036a9a61cc51d587ec5056feafe389e49f6d77c7d8a31734a7c43d0ae001dbdb1f89e1cf68f84330c13e7d8ef1c985b86dff2570ab92f84cf5ea436b6032092bc74f8c908e3c"}, {0x28, 0x29, 0xfffffffe, "b42e3b87d499039a55613d3f3afac58efc068c579e26d9"}, {0xc8, 0x105, 0x1, "d4fc5fcb385a5f79716fc36828bdcca52367eb86c5985d2f946d5ea2f8d83b5f21d17b03ab7c3a7818b4092f24a6dde3659606b56fb87342ba92d970c0c4e7660ef7f28ecc398e17633a7c122e36ff0e63e03cd0e4906c9ecaf8d1720746f9dc52f8a8424f20faf30047dfc489e6ae1d7822d9220316c0c8c0216ce7623405f06e4cf5c2f1fc635abaceabc3344fd5cfa4cf134f70a4bcabd5b63240df49a5e92b45bf70b5132e5e4be35deb9ecbb5817bc5ab719a04ae"}, {0x98, 0x107, 0x9, "ca4c22701ed5b28abc4868e3f4e7eaf69b3b2139daeab82b0008eefac8559b933348c885d5affabeeb947fe88030af20c27b0489a05c453311350cd3bf69830cea28b5d7702b2d380fed8fd8d1cdaa6fc6127ccbc550ead9e22ae6758de84d4b9277c9284cd7f9c0038824886a8644e74a75c836f96995a353ad3823c91bd03fd88c41720c1485"}, {0xf0, 0x0, 0x40, "b7f5a289262083b5d404fe368bffe54be12d54b5358ab25b5a0d915223ffd2c7543442ea4c490d8b990d438a7bafd8aadeb3d736dee84d5c70618dbb4d15d3766b5b61ef14270a287983b919ac3afb0eaf6555abfc454360b953fa09120fa8e675750509ca2586cfc0fe842529ef3607bf46eb9685329ba07d51c0fa3c1452d44425791c01947821bbb431793ebae2032ed4ce00ef6bbc5541fd32effd5f841e50722605f96ecf1d6387eea776f865933931659a50131211e7f3494b5375e26be598aea9bb29d8724746d1f31b1a580bc8c1b093553a1433113d"}, {0x60, 0x87f24c7578a1d58e, 0x101, "5ca68c86a01fb5806e1e0fcbd04fcbd3e28da7fdb2c5225d9676b31b264f238fe77886f8278c5a562b422935176e13f9e988ac73a1a9219e7686aae43e5de923942daa34956db2239e037d"}], 0x3e0}}], 0x3, 0xc800) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 00:42:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) wait4(0x0, 0x0, 0x0, 0x0) 00:42:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000146081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4702000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4800000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) [ 775.970863][ T24] audit: type=1326 audit(1639096921.455:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 775.999141][T11691] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=24596 sclass=netlink_tcpdiag_socket pid=11691 comm=syz-executor.5 00:42:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x4000, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="4c02bb52f80770690550aaea10b56f1bfc470311391e800fabb7f119fdd483422e4732d744d0a87f34eaad57ac719084", 0x30}, {&(0x7f0000000100)="0a53a7eb7fa3b722ac9c9ee7e75d34bccf3a317fd071e956596ee919096a6d22690097e85ca5208eac3a194067d0159f98528aba4b39660392bb662e31c78f573b92e6b279dc945d280ffb66d86fa827a254", 0x52}], 0x2, 0x3f, 0x6) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) [ 776.055095][ T24] audit: type=1326 audit(1639096921.485:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.079288][ T24] audit: type=1326 audit(1639096921.485:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.103205][ T24] audit: type=1326 audit(1639096921.485:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.127113][ T24] audit: type=1326 audit(1639096921.485:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [{0x0, 0xd11afd4e}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x480, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 776.150994][ T24] audit: type=1326 audit(1639096921.495:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.174962][ T24] audit: type=1326 audit(1639096921.495:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.198922][ T24] audit: type=1326 audit(1639096921.495:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.222732][ T24] audit: type=1326 audit(1639096921.495:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 776.246699][ T24] audit: type=1326 audit(1639096921.495:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11686 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) wait4(0x0, 0x0, 0x0, 0x0) 00:42:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x4c00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae02003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) sendmsg$nl_route(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_delrule={0x34, 0x21, 0x10, 0x70bd2a, 0x25dfdbfb, {0x2, 0x14, 0x80, 0x3f, 0x5, 0x0, 0x0, 0x4, 0x8}, [@FRA_SRC={0x8, 0x2, @multicast2}, @FRA_DST={0x8, 0x1, @private=0xa010101}, @FRA_FLOW={0x8, 0xb, 0xfffffffb}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x40) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x6000000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x6800000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae0a003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee01}}, './file0\x00'}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) fallocate(r4, 0x13, 0xfffffffffffffffe, 0x101) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x80000001}}, './file0\x00'}) sendmsg$NL80211_CMD_DISCONNECT(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x1, 0x2}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x37}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1b}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20020004}, 0x804) 00:42:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) wait4(0x0, 0x0, 0x0, 0x0) 00:42:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x6c00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write(r4, &(0x7f0000000100)="b6d11ae5a6e4f07a34cbc83d070ae8a821e22ae45aed1fb527792b91e1753f76eeccf44c310a99ae6bd09fca663249209598cf270a4f962a3775ec8cd4ad1822818897d378cec398ab30ef48821368995c45cec29a83cbd99600b3e810f1ee10c215173110a04e7a92172eefab39cc599eaded3328e063b3ab8420e88dfc6a6abf9181e3fdc78ee9b2d43fb6a459c00e0cc1c0142762533cc8fc3744bfa3b9e02a4b5c00a8606acde39543cffc56ba26676b79dec7b51979beb918382c28", 0xbe) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r6, 0xffffffffffffffff}}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000a00)={0x0, 0x0, "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", "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"}) 00:42:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae100020000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) wait4(0x0, 0x0, 0x0, 0x0) 00:42:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x7400000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x7800000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 00:42:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x7a00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae100039000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x4, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x7fffffffffffffff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6400}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10023c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:04 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x5, 0x8, 0x7d1c, 0x1ff, 0x6, "03e55030225f7be6"}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) 00:42:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x8100000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10033c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6500}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x85ffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10043c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6600}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x90002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x8900000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10083c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tkill(0x0, 0x1) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x8cffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x6102c0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) 00:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6700}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae100f3c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0x9d05000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) recvmmsg$unix(r2, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/141, 0x8d}, {&(0x7f0000000040)=""/54, 0x36}, {&(0x7f00000003c0)=""/44, 0x2c}], 0x3}}, {{&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000540)=""/92, 0x5c}, {&(0x7f0000001d00)=""/151, 0x88}, {&(0x7f0000000680)=""/142, 0x8e}, {&(0x7f0000000740)}, {&(0x7f00000007c0)=""/115, 0x75}, {&(0x7f0000000840)=""/183, 0xb7}, {&(0x7f0000000900)=""/55, 0xfd78}, {&(0x7f0000000940)=""/4, 0x4}, {&(0x7f00000005c0)=""/96, 0x60}], 0xa, &(0x7f0000000b40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)=""/212, 0xd4}, {&(0x7f0000000980)=""/9, 0x9}], 0x2, &(0x7f0000000e00)=[@rights={{0x38}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000000e80), 0x6e, &(0x7f0000001240), 0x5, &(0x7f00000012c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000001380), 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001400)=""/157, 0x9d}, {&(0x7f00000014c0)=""/117, 0x75}, {&(0x7f0000001540)=""/63, 0x3f}, {&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/100, 0x64}], 0x25}}], 0x5, 0x40010101, &(0x7f0000001880)={0x77359400}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001b40)={0x0, 0x1, 0x94, 0x5, @buffer={0x0, 0x6f, &(0x7f00000018c0)=""/111}, &(0x7f0000001940)="9f8174789f667b3df0ed32a96f3054bc3ef42dc803320b6d2b563eeffa7e8659d703491961a967d850e591ce9f8ed8dca796a65dd8562c6b0751f4544db96f443853135ca6aa49ffee48380de9f80e34a2b52d4452e2d9aa2f8754ff4d6df39c9c07fb45df5b3c2a6d8e7f66a3841a9d177173e92187b7d90d4c62af44fb566c11c8fa2a527f1d0d01d5e145c7499c61c4bc10d3", &(0x7f0000001a00)=""/226, 0x8, 0x3, 0x0, &(0x7f0000001b00)}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x78) r3 = memfd_secret(0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0xc, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c00)=@RTM_DELMDB={0x78, 0x55, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x3, {@in6_addr=@private2, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x3, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x1, 0x4, {@ip4=@loopback, 0x8edd}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8810}, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) 00:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10603c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xb801000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xbd01000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000800"/120], 0x78) openat(r3, &(0x7f0000000040)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae100ec0000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{0x0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xbe01000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae100039000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000100)={{0x0, 0x7, 0x1, 0x1, 0x1, 0xaf55, 0x1, 0x8, 0x0, 0x0, 0xfffffff9, 0x3, 0x5, 0x2, 0x401}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x189422) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x5393, &(0x7f0000000080)={0x2}) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x50, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x23456}, 0x186) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x20}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ftruncate(r2, 0x7) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xc305000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 781.277586][ T24] kauditd_printk_skb: 484 callbacks suppressed [ 781.277599][ T24] audit: type=1326 audit(1639096926.755:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xc811000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) [ 781.307907][ T24] audit: type=1326 audit(1639096926.755:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 781.331890][ T24] audit: type=1326 audit(1639096926.765:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600200000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000677a04"], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) [ 781.355975][ T24] audit: type=1326 audit(1639096926.765:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 781.379858][ T24] audit: type=1326 audit(1639096926.765:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 781.403997][ T24] audit: type=1326 audit(1639096926.765:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 781.428727][ T24] audit: type=1326 audit(1639096926.765:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 781.452714][ T24] audit: type=1326 audit(1639096926.765:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae1000c00e0500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) [ 781.476849][ T24] audit: type=1326 audit(1639096926.765:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 781.501013][ T24] audit: type=1326 audit(1639096926.765:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f0000000040)="569c7cc70879caafa26a19782958a0934afc8a4d274837e17cea2337c883c414a39201e87d1faf2eaecb79d520f761d8b73b1588ca3d6b6e03af2a6fdc146c85901159a3e37f03fa4260ba44c7f6648580e9b4f45b474a0d6bc570771ab069ea1305f818f5a20dfb", 0xfffffffffffffd7a, 0x20008055, &(0x7f00000000c0)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xd800000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c020500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xdaffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c030500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xdf00000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xe000000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c040500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xe100000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:08 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_io_uring_complete(0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0xffffffffffffff53, 0x7, 0x6, 0x0, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x4000001) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES32]) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x78) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) 00:42:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xf6ffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c080500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xf9fdffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfb11000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfdfdffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c0f0500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfeffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c600500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfeffffffffffffff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xff0f000000000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b5507", 0x7c}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c002500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffdffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffff7f00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffffff00000000}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffffffffff0700}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c002500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b5507", 0x7c}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffffffffffff7f}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7500}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000503008311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xfffffffffffffffe}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18, 0xffffffffffffffff}, {0x0, 0x0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7600}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000504008311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b5507", 0x7c}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7700}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000502018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x20ff) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460013e658625791360d000200000000000000000000000000000000004000000000000000000000000000000000000099d6100040f15158c163d5094a9507870000003800000000000000000000000000000000000000000000000000000000000088721abf6085f1ac7c2c9ccd35e4d0a700"/136], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r5}, {r4}, {}, {r4}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r4}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {}, {}, {0x0, r5}, {r4, r5}, {}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r13}, {r11, r5}, {}, {}, {}, {r3}, {}, {}, {}, {}, {0x0, r14}, {r15, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {r3, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {r4}, {r3}, {r16}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {}, {}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {}, {r8}, {}, {r3}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {0x0, r5}, {}, {}, {}, {r3}, {r4, r5}, {0x0, r5}, {}, {}, {r4}, {r11}, {0x0, r5}, {}, {}, {r4}, {r3}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {}, {r4}, {0x0, r5}, {r4}, {}, {}, {}, {}, {}, {r3, r5}, {r4, r5}, {}, {0x0, r5}, {}, {r4}, {0x0, r5}, {}, {}, {r12}, {}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r6}, {}, {0x0, r7}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r9}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {r4}, {}, {}, {r4}, {0x0, r5}, {}, {r3, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {r3, r5}, {}, {}, {r4}, {r3, r5}, {}, {}, {}, {r4}, {r4}, {r3}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000002c0)={r5, 0x0, "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", "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"}) r17 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r17, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r20}, {r19}, {}, {r19}, {}, {}, {0x0, r20}, {}, {0x0, r20}, {}, {}, {}, {0x0, r20}, {}, {r19}, {}, {}, {}, {}, {}, {r19}, {0x0, r20}, {0x0, r20}, {r19}, {}, {r18}, {}, {r18}, {0x0, r20}, {}, {}, {r18, r20}, {}, {}, {0x0, r20}, {r19, r20}, {}, {r18, r20}, {}, {0x0, r20}, {r19}, {}, {}, {}, {0x0, r20}, {r19}, {}, {}, {0x0, r26}, {r25, r20}, {}, {}, {}, {r18}, {}, {}, {}, {}, {0x0, r27}, {r28, r20}, {0x0, r20}, {0x0, r20}, {}, {}, {0x0, r20}, {}, {r18, r20}, {}, {}, {}, {}, {0x0, r20}, {}, {r19}, {r18}, {r29}, {r19}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {0x0, r20}, {r18, r20}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {r19}, {r18, r20}, {}, {}, {r19}, {}, {0x0, r20}, {}, {}, {}, {}, {r18}, {}, {0x0, r20}, {r18, r20}, {0x0, r20}, {r19, r20}, {}, {r23}, {}, {r18}, {}, {0x0, r20}, {}, {r18}, {0x0, r20}, {}, {}, {0x0, r20}, {0x0, r20}, {0x0, r20}, {r19, r20}, {}, {0x0, r20}, {}, {}, {}, {r18}, {r19, r20}, {0x0, r20}, {}, {}, {r19}, {r25}, {0x0, r20}, {}, {}, {r19}, {r18}, {0x0, r20}, {}, {}, {0x0, r20}, {}, {}, {r19}, {0x0, r20}, {r19}, {}, {}, {}, {}, {}, {r18, r20}, {r19, r20}, {}, {0x0, r20}, {}, {r19}, {0x0, r20}, {}, {}, {}, {}, {}, {0x0, r20}, {r19}, {0x0, r20}, {}, {}, {}, {0x0, r20}, {}, {0x0, r20}, {r18}, {0x0, r21}, {}, {0x0, r22}, {}, {}, {r19}, {r18}, {}, {}, {}, {0x0, r24}, {0x0, r20}, {}, {0x0, r20}, {}, {}, {r19}, {0x0, r20}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {r18}, {}, {r19}, {}, {}, {r19}, {0x0, r20}, {}, {r18, r20}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {r18, r20}, {}, {}, {r19}, {r18, r20}, {}, {}, {}, {r19}, {r19}, {r18}, {0x0, r20}, {}, {}, {}, {0x0, r10}, {}, {}, {r18}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000057680)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000057880)={0x32, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r18, r30}], 0x80, "9c19096eebfb0c"}) [ 786.565090][ T24] kauditd_printk_skb: 387 callbacks suppressed [ 786.565102][ T24] audit: type=1326 audit(1639096932.045:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 786.595297][ T24] audit: type=1326 audit(1639096932.045:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.629461][ T24] audit: type=1326 audit(1639096932.105:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.653651][ T24] audit: type=1326 audit(1639096932.105:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.677733][ T24] audit: type=1326 audit(1639096932.105:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00'}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 786.701712][ T24] audit: type=1326 audit(1639096932.105:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.725620][ T24] audit: type=1326 audit(1639096932.105:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.749807][ T24] audit: type=1326 audit(1639096932.105:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 [ 786.773955][ T24] audit: type=1326 audit(1639096932.115:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000503018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x5, 0x603}], 0x0, &(0x7f0000000000)) [ 786.797877][ T24] audit: type=1326 audit(1639096932.115:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18453 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f690b1d2af9 code=0x7ffc0000 00:42:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd43", 0xba}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:12 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000008000000000000000000000000000000004000000000000000000000000000000000000000000000000040004fbf18f3c1fd40dad24b0c355764800c5318d359feba0dc890fc7b6eee195f06cbdca15385824b3cbac6c50effff0000c5adbf68d9bb6335200a37c63a33592a32289f02c70179fe258d8716250fc263"], 0x78) openat(r0, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) accept$phonet_pipe(r0, &(0x7f0000000040), &(0x7f00000001c0)=0x10) 00:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e22}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000504018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0xffd7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8, 0x603}], 0x0, &(0x7f0000000000)) 00:42:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46000000000000000000400000000000000000000000000000006c814f020000004000ed4579e80000000020000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000001a6218dc0fbaf1b600"/120], 0x78) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x7}}, './file0\x00'}) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x9, 0x101) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000508018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd43", 0xba}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x9, 0x603}], 0x0, &(0x7f0000000000)) 00:42:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000005af, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 00:42:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050f018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xa, 0x603}], 0x0, &(0x7f0000000000)) 00:42:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket$inet(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb, 0x603}], 0x0, &(0x7f0000000000)) 00:42:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000560018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 00:42:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd43", 0xba}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc, 0x603}], 0x0, &(0x7f0000000000)) 00:42:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500038311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:14 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$cgroup_subtree(r4, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xb9ad}, [{}], "ba5a1e8fed9988be3f2fae27ef2d7b16df9c83c892e9d1fcdba11a49d0e652ac06caa5639a2f243c5b9bcfd402503915b031558d4694008b36014fc4daca483425efab2a3073656564f82e8fc39463e5ba192341187399ca7661dbe35f7f382335b4c818b44f31478205e654669e498ff0c346b75ac86d2e221bd5e6febd498671e76152f9edc184b8dafacc8013c096cff4ce136a01d4ae493ce37932ab843be3f2c19908ce973ef25c819cb62f879c5d9d246b0cf4c559fc"}, 0x131) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd, 0x603}], 0x0, &(0x7f0000000000)) 00:42:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500068311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe, 0x603}], 0x0, &(0x7f0000000000)) 00:42:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292", 0xd9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:15 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x90040, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000002000000000000000003800"/120], 0x78) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf, 0x603}], 0x0, &(0x7f0000000000)) 00:42:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500028311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x10, 0x603}], 0x0, &(0x7f0000000000)) 00:42:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x11, 0x603}], 0x0, &(0x7f0000000000)) 00:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292", 0xd9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:16 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getneightbl={0x14, 0x42, 0x400, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8005}, 0x4041041) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x202001, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500038311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:16 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x12, 0x603}], 0x0, &(0x7f0000000000)) 00:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8300}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:16 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x22, 0x603}], 0x0, &(0x7f0000000000)) 00:42:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500068311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:16 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000000000000", @ANYRES32=r2, @ANYBLOB="03000000040000002e2f66696c653000"]) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8400}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:16 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x25, 0x603}], 0x0, &(0x7f0000000000)) 00:42:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292", 0xd9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:17 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x48, 0x603}], 0x0, &(0x7f0000000000)) 00:42:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500088311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8500}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:17 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000081bae7987973d7b5f65eee7863402b567477d7d5020aa94522efd755000000000000000000000000000000000000000000000040008a590000000000000000000000000000000000003800"/148], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:17 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4c, 0x603}], 0x0, &(0x7f0000000000)) 00:42:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8600}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:17 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x60, 0x603}], 0x0, &(0x7f0000000000)) 00:42:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050001832d001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc", 0xe9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8700}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:18 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x68, 0x603}], 0x0, &(0x7f0000000000)) 00:42:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x350, 0x40}, [{0x0, 0x0, 0x2}], "2b1a9b734b49fdb4d566dac0f0035fac15293d370f33d9270b9dab0594051c36954373f157c35bc3160b932d2ffb5147c3dbbb4493511b0d55be1b44a9f24df4d46bd08a1062490499ce1ed406ef0a35f24e97689fdd7f212cf217d81140b5d774b986667203ec388fdebcc470a4537592e6ddfa3b9b9da42a0dc31023472c3d2a2a4dc36a0da4cb67a0b158655c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x906) r4 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x14) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r7, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xe}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xc}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000010}, 0x8004) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) fsync(r6) 00:42:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311021f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:18 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6c, 0x603}], 0x0, &(0x7f0000000000)) 00:42:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x6000, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:18 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x74, 0x603}], 0x0, &(0x7f0000000000)) 00:42:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311031f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc", 0xe9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:19 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x78, 0x603}], 0x0, &(0x7f0000000000)) 00:42:19 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000009e510000000000000000000000000000000000000080000000000000000000000000000000000357e302956b8ae929000000000000006800"/114], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311041f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:19 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7a, 0x603}], 0x0, &(0x7f0000000000)) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:19 executing program 1: setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000040), 0x4) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x400080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:19 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x89, 0x603}], 0x0, &(0x7f0000000000)) 00:42:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc", 0xe9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311081f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:19 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd8, 0x603}], 0x0, &(0x7f0000000000)) 00:42:19 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x12) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000000100)={0x2, 0x1, {0x0, 0x3, 0x8, 0x2, 0x4}, 0x8}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 00:42:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:19 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xdf, 0x603}], 0x0, &(0x7f0000000000)) 00:42:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080), 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:20 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe0, 0x603}], 0x0, &(0x7f0000000000)) 00:42:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c0005000183110f1f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080), 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:20 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe1, 0x603}], 0x0, &(0x7f0000000000)) 00:42:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311601f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:20 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000100)) ioctl$FITHAW(r1, 0xc0045878) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], "", ['\x00', '\x00']}, 0x278) r4 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r6 = fsmount(r4, 0x0, 0x8) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r8) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080), 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:20 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfe, 0x603}], 0x0, &(0x7f0000000000)) 00:42:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b25acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:20 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x10e, 0x603}], 0x0, &(0x7f0000000000)) 00:42:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:21 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1b8, 0x603}], 0x0, &(0x7f0000000000)) 00:42:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x602740, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r6) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40, 0x289, 0x0, 0x0, 0x38, 0x0, 0x7, 0x4}, [{0x4}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) 00:42:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0xf}], 0x1}, 0x0) 00:42:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:21 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1bd, 0x603}], 0x0, &(0x7f0000000000)) 00:42:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x10}], 0x1}, 0x0) 00:42:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:21 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1be, 0x603}], 0x0, &(0x7f0000000000)) 00:42:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x1e) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x100000001, 0x80, 0x1}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0xfffffffffffffee4, 0x7, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}}, 0x1c}}, 0x0) fcntl$setsig(r4, 0xa, 0x23) 00:42:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47", 0xea}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x3c}], 0x1}, 0x0) 00:42:22 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x204, 0x603}], 0x0, &(0x7f0000000000)) 00:42:22 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x10a20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81805, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x24002da6) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x608980, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x20742, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0xb) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/448], 0x78) openat(r5, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) 00:42:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:22 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x219, 0x603}], 0x0, &(0x7f0000000000)) 00:42:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:22 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x241, 0x603}], 0x0, &(0x7f0000000000)) 00:42:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0xc0}], 0x1}, 0x0) 00:42:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 797.124102][T25155] loop0: detected capacity change from 0 to 1036 00:42:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47", 0xea}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:23 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x242, 0x603}], 0x0, &(0x7f0000000000)) 00:42:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0xec0}], 0x1}, 0x0) 00:42:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) close_range(r3, r4, 0x2) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:23 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x247, 0x603}], 0x0, &(0x7f0000000000)) 00:42:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9b00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r3 = fsmount(r2, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x33fe0}], 0x1}, 0x0) 00:42:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47", 0xea}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, 0x0, 0x0) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:24 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x300, 0x603}], 0x0, &(0x7f0000000000)) 00:42:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x200001b9}], 0x1}, 0x0) 00:42:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000033c0), 0x10b000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000003400)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) recvmmsg$unix(r2, &(0x7f0000001ac0)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000180)=""/156, 0x9c}, {&(0x7f0000000240)=""/154, 0x9a}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000040)=""/16, 0x10}, {&(0x7f0000000300)=""/109, 0x6d}], 0x5, &(0x7f0000000380)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000006c0), 0x6e, &(0x7f0000001a80)=[{&(0x7f0000005440)=""/102400, 0x19000}, {&(0x7f0000001b40)=""/111, 0x6f}, {&(0x7f00000008c0)=""/204, 0xcc}, {&(0x7f0000001a00)=""/77, 0x4d}], 0x4}}], 0x2, 0x80010000, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000003380)=0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000003440)={0x0, 0x0, "f599304969507edf406a65151070fabe85d3bfac9c42b5fba719e00f86519c56d09a58bc5afd8e86e750c6ed3938eb780d4b28128786e6e682deffcd15f822c0b3b504341eacf8921f489cd7939ef771b528137f05c2fe7152ebcd81fb256be8a743b5e4b3c7533a543453fc40cac1dc3ea96da746e8df0181be0cccb72c669b1b50042ae063e000adf0dccadf286d81b735a28e696577e64ce53cb338e643a176ad08773c56bd869f4ae8ffa72a54b08d1a845ca6bd8396bcfa78e2558bdd5f1f47c79f5060e65c8893ae817c4b656a1fe5df61be6d4a6a50ca7dc0a85e3c519b35de2b967390c6ece3e004994042af0f5a43dd1ff3286ad0dc46e36b1abfe6", "7f7d677b83b33d9f67405476d99b7f2df05cbd7e43659ea456da402371dfc66a4ce82ba48a9ae14e1408ff74d5a2aeef24e69d3846d869e33ced84978a485ea93b15767ea352d5bc1ab47dcddd8c221d2471ed600373a447aa2d1dd3bd2d31001b47abfd322a6b93ba8705d58cee9ab5f6b168d499a0a20920dcb78f43e01e587686b8098b4937beb2e87fd29a1be981fc53d63cb5cb7f5264d62c83d1b5cac5ba3da92d79941fafbb7fb56d88fa2b012a55c6818d4f1111c41ec853d3e1a329add513707082a81615520f4f55e1c6a895f6af4520017f3e08fa78836020d64911b382296087a25e5c3b1b1bbed63e069900a4877bb662933939deae3058fc1c0a4fe21396256ba662cd61523d557b9290a1dc942aaeabf6332784cd71cca96a39346e832fbb051fd1b10d6d158de12614af3f4c66068e642eadf40ed24f09b2402701c0340129d6275b388540a890a56fc58fa6a8dc6dfdd9ad9e4ac377bd6b8674efcda16dd8ba571a28db5990ecde9d5dfca7a54b0a7a1a0c245ba52747570ff440efbce9668f4358c8309d8e0830e0fc6d9f8b6a4904d4ab0b3f8650201d9fa94c685cfe6856e603cd9e38fac849ca7d3b1b806561a0aae0ea9e14ccb010b4f2a801d6c1a30e518edfa5917d4f4b7096b415f22f8e75ce42b9ab6ba6e6f088f9d7b0f310dd491e3168fa3a96c265b2772b697546c35696437ebc926bdfb543f0be2a26c69f623b648d8f3b4bdd58c3c7d278d0909e4efbedaac172841d1ae3f187391dbd5d2d737f8deeed57ac0b29a67fd8d4f938c6c830ed5f094a6c0cbc883f05384ae692fd6fefa31e2d93e7d1344f6b9110470d42421b1f7607b30f23d6401259e67bd53d2d2378e642a4aec744f332333f122f94983e99ba1ffb39c6c8028641869a1f831980fafe54166b3dad2d87c725cca27cc8ef5379fc384446567b11f1602664b95179e8cca86e448e8d0a4fdc0045128403d78acb6afbe391767a6e45ecf91c28b0b5778caf81a7c11dc641a178cbc3eb091e2386b0d6c6d2289f405f29ee415d4d1554c65427e3445f358c7c7263421f4ab439af055c7da25ba4a5fe95f57fd54cb007b7bd6d090a09714b7a38d7648003b76171df758a2dd73843fa78a6b3a00b3dffa2382db2119237a73b9cfc6528eb03ee0fc4a0bdbfaccfe06076589501e34cac364750050d600fbbbc9bdd20cbdc1d20fc1a4a9d36b348e591fcb7aadaa3945875f19944b0ff6b6ac105dcaffcc1fb95458faddde235c722ed385fe3e1a20553279b450fe80615698dcfeac8cc7828534a070657923e6e6188f1fcf4feb54d2ffb09a2a709d5fd24ee5f5eff11579b3c5f8a14f5b97d5aabbdb5bb9d2dacdf301bb74898418d1d1fb9506713284c0c5b9fd306919c020d832b07080f1bb33abcb28ee0b6c33fc82aaaa92ec2ec688d9ba4e671c78c91c8928ae4c94945ede9ec33774e26fade77250b5f35a05fc0eac5d368cd22fbb30a480d1d4629f260a949dec02ae521e2ec2a7389ed75f659b6a8a68829b6ace9422ab818e61a9690e53d84d1295234ea15452723cceed880a0de1815fd93f5cb8b35815cfe1884596c596bd9730d65092c18762f4ab397846406dd920c7d36373988281f334f2f89b0e8ecf29ad684620e9c1c26ff2714cf010f9d93a80297280c4eb37461e838bc1b4780ddefd88ce2aaff72d0ff3e3619d5c337af18c57e49e8570a69349b2d35d0817e0438db39acb08eebcfe54f356b46995016f00f6144145ea55470eb2da9460aafb53f443ec989d4a9f8aa84d70b06b3b8ead3260d3e51b98bd00de71366515a44122bff5497e0a493d0f74d4d1c78b4572e5bdf9d744cbd11047b5e5015377774550f8f3fc2f5acc0d8e0313311832ff9b487fc0ec0234b5361ca4bc30bad7dfdcd6b6d15e176be9d1b5a06654aca9442e14fcbaed99014da1ca3a23a8987579b851f089d6717066e59c17e1c3cbade38e164a0e49d4d27901de3ebbed484073f0a451e0f6ddf742524845b3b3277bfac8caf5a8353436e1274bc000b607b3757ee99b563a7e3c8e991942dc555dc1861ca7b258cd5c73cfc297ad9e2cb714ab5d1f3c9c5e9b4aa5ce719305c28ca15102ce21b1101cf9ec74bb3c6f23bbf6e359626d91576ada12d901c3c6356fc9012b60dd283ac2a12c6a5eca83a253b02bc5b91dcfc0a633f18ead01e3fafa2b1e45807e57daf439e5a4e6d25f92c4c936ca0c79d6dba94060d7818a4aa5c70d64b7ae6ab914c4620b4c8e7fce56dcd35bed96b4a3cd6ebcdf48223b7b350a752646e95f8ffdd7400a36665a0f34e37fe0c910849aa25ff9b7310bd0262254e5ac069a81bbba8af2423b482b3dec685999e62c68583d0c7c0b07e92d944747d2b9068c0f1075298978d0c3f1bec2170fc91d5dfe44499986a92df639581ab3e944d55828f81efdd6525e7a9198631af48f1d4d7e12eb8ed3e6b47dc125e47d24fddc24e2901ff72dcc98f3748ba0c11b607ab03667d1f9debc5c672c795f34a5d02dd98bd0121c460168f7855f97e9d7c6e018e9ab42dac9de2c5e423c20fe972b1d5200f26e4626da94d85fd540f3020b51c3441922e3d2f6e3f9ea39140c59da95caf29e181193a5a7e63454df167208c8abf25751b21ef185e4dbf08eb21861f920079898d90779e0269371e05abeb65906ee990df8207d19bb3b2bd6b028f2d6771a5bef7e3119fef6e0e179a9dc2b0d0f8e7deb05470fc04e6b5c562f67e4e255fd546a61c1b227bc955e5f2f27af8fcd6d6d37d1035b3e813a465b7b5b3dde0a18ebed4ad738635819d1e0803da1a6c5d1ff798f54bbee666c655400fe7295675bb7e7bdf7e5b4f329ae6e34f125a23e05e97e07398014eeb727a32ccbd43b70586b9c08eaf5f81c77e28112ba24b9c93fc64e4eaaef2aabc3dabd597ff47e9271a6f7c69a8c65d9fc7ef33599e44a59fe6f9da8fbe55c27ee1261e25414d9737454261cc047a220690de51affb33d036c5a08e2347ca77bbc69c4a8279d69a5c42d29f2de794050787e443eedde1b16efc84eccda9616e21a8e6c0b68f446d75ec99d37edc553fc1adde09ff6f2ff504df6052fdf089b793196a8871e83d967c893424d10838e401cb239397b558b9709bac3174119d46337da68c4556e98df5d5b3477eb49b198806f39db5c145e5294bb4be7020834437e4c36c63c343c28818c8a6bc19ff419a458ddbdaae4af0dbf98c463c90fcee29770f640edf7a1a14e7b0307800a44069d893eb2f5d93229c4a1f522b208fc316482966a678f7ce2b14eb414a10969bc4426f5a1d89d41ecb55d25dbad5f0a36ffd0ec283376193cea0e56bb7584e8c0b38ee37d52ced50fdb565df4c92cbece99b8429aeb1d9cb8d37e664ef3ad643ccb4453ac6f17a6535116f7e3c10ac7929c996ceb69fb302c195e1e65a76f6e66c75b817e16cac78ae071ad703ed1cf3e253eea4a6a9ccde1ee561798c586eedfde10bd1a9fd73fcbcf1a55613ea6786a409b74419b7475932f9283ca91213077d51825178aae6587785b5364e4f504fcb4572f62ce329b78be74397cf0f10f2524f7e602f13933caa66c91d16b91de5f75fa7835a28d4a9c521a0a9625e0bc5440e6a02df07db51f1e865c1652ce9b7e5cf8f499e0c3e34b15b1fccc5b155116034502c41c0e554ee22ace18d09f6fd621a837f4147df4ada49d1b2db1624233e56e15dd4dd5a41f166815904b8a63aff866bbaf518e4f3d6b776f38fac13926a12adafcbfa4d6cc8f21cd113e1e592817789dc3a0ddba17fa58dd927036d4b4019fdf06dfa4452e8bb7071a4af3974c89294dd592e04e4bef068e7dc7d0f2284c1a49d9fda7902a3bf7485c056d02ab49a2b8d4a8098d03e8e90d23da8f06f0e884ca522fb69b656b7e5f5e50a8034b0641139e1bd175c4411593413a48f11fdaa4f72655cd82e96eb3a408859c7a30bbdd8ef496caa0fc6df8a9a254f9e1eb11af23f38b3e24444715314ba00a43e42ea9baf59c895d127a530e376014571bed86c450be3f2678065198fed49f68df524a1b4f085826d6db6c969fa8c4b9142eff55d2e8c37ba4367900e42d8044d9a4dbaf03d4ff86f29a296f95aa8f9101292719a18883b803ef509a1141e6f2ada94795328c2c87981b43466e1aa7da9d5f0d2a7650e2ca6f7520247ae17a6dd494fdb8028ce8e13f3ce2627c9f33c44adb7ca690a467e019924d0b579a76af9be08ea524f78a607398a2463bf969a9cdefad5f27ec5e5cde1ae0dcde2ea211939a4560244d5fd2b4b379d3f6cdcf1eda9687cf3a58d36c6635fe85c212f977164eb4ef61b313af714f764c699f747c585168e81edbc6966016b359e848dd64228685e0cf67f0c153d6daefc27cd072290c53c13593f210d56dcdb7f33c65111b731ce9928349a7e4fc3fce89ffd3b48dd7385d0c784c12dd436d3e022187242f1e97250860235fcdce410f26c4d9d495c05509af719a0e9588e63fc264360dedfa2dc0fa756bdeddb5dc2cf536a2fd05f2bc1ba130e16b69b2e95c170d8a7dfc3587013ee455807efc904de5ed33ae4332badb05d820f7f7a74272ae0702e3bca1872c082ee3a55b910185f628d39d50b6bb7b64c9ce56efa555c3744a4291b1467d70f005a6764736e8834d1503662333695c3fd8828e6e6bca842efa550b97f3d46d521a971f4b7cc47c5d930521c320889eed09533deb6887d251d6921fb60b0a4d901858ca8f5913d734674fce4cb740d8107603562cc23639407a801b886a2fe1dd0719c651eb010ee23c2d84ebb07a434f5016331698904854167a04705b563ce3d7194880c5fd1f92fc037235ce429ab0368477a6e30f9caf3118ce033f7b4a9628deac78e8871d9fe6bb51fb74be7e7f39abe3e52f5edaf194af725f500dfb240967c846d6597904ebb69e9cfb9b69e9f25009c6e80d746b66321d532ee1beaff56f13921116e81d3da8040ce3cb28a48bd6f784bc2b22c7ed2b7136984bfe078141666222ebc3de1c14dfe0ce60f3d1d2c005eb676b6364c782d7fb10fb7bd928b9c1bb40ce372352be9fd714aa7501ca0ab0b198782c16c432a10241d5bd867769c6d69daeb3cbcb706fff635a3239fe7536d57025f205d678e358922775156058b819a6963cf70f895ab200295a4aa063800c5070c321ebb333c3a0afdbf6530f97728ce509e7c882d255d9437508ba6d895f341fd558705035f8bbbf01f2a0f7d85e71d2d2097fb331da5700b0ee9839a41a46a07a4a04f7c6c5186e5101c8d180e014fdd8dac5492d4997ad1a63602c350ba4045baa8c1fd5ad342093da1d522dc817e73449454ac7ddb82881304a03f49c7850d94c434b960e2aa4c59e106aa4bd50d920696aea3163e2b3fd3ee8fcbb194b8"}) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r8}, {r7}, {}, {r7}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {}, {r7}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {}, {}, {0x0, r8}, {r7, r8}, {}, {r6, r8}, {}, {0x0, r8}, {r7}, {}, {}, {}, {0x0, r8}, {r7}, {}, {}, {0x0, r14}, {r13, r8}, {}, {}, {}, {r6}, {}, {}, {}, {}, {0x0, r15}, {r16, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {}, {r6, r8}, {}, {}, {}, {}, {0x0, r8}, {}, {r7}, {r6}, {r17}, {r7}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {r6, r8}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {r7}, {r6, r8}, {}, {}, {r7}, {}, {0x0, r8}, {}, {}, {}, {}, {r6}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {}, {r11}, {}, {r6}, {}, {0x0, r8}, {}, {r6}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {}, {0x0, r8}, {}, {}, {}, {r6}, {r7, r8}, {0x0, r8}, {}, {}, {r7}, {r13}, {0x0, r8}, {}, {}, {r7}, {r6}, {0x0, r8}, {}, {}, {0x0, r8}, {}, {}, {r7}, {0x0, r8}, {r7}, {}, {}, {}, {}, {}, {r6, r8}, {r7, r8}, {}, {0x0, r8}, {}, {r7}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {r6}, {0x0, r9}, {}, {0x0, r10}, {}, {}, {r7}, {r6}, {}, {}, {}, {0x0, r12}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {r7}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {r6}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {}, {}, {}, {r7}, {r7}, {r6}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000004440)={r4, r6, "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", "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"}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r18, 0x4c82) 00:42:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, 0x0, 0x0) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:24 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x319, 0x603}], 0x0, &(0x7f0000000000)) 00:42:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, 0x0, 0x0) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x7ffff000}], 0x1}, 0x0) 00:42:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9d00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:24 executing program 1: sysfs$3(0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x25b8}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f", 0xee}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:25 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x402, 0x603}], 0x0, &(0x7f0000000000)) 00:42:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0xfffffdef}], 0x1}, 0x0) 00:42:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:25 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r3, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x11, 0x1, 0xfffffff9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000001180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x740) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:25 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x406, 0x603}], 0x0, &(0x7f0000000000)) 00:42:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:25 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x500, 0x603}], 0x0, &(0x7f0000000000)) 00:42:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x2}, 0x0) 00:42:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f", 0xee}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:26 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x59d, 0x603}], 0x0, &(0x7f0000000000)) 00:42:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x3}, 0x0) 00:42:26 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x5c3, 0x603}], 0x0, &(0x7f0000000000)) 00:42:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:26 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x600, 0x603}], 0x0, &(0x7f0000000000)) 00:42:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa100}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, 0x0, 0x0) 00:42:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x6}, 0x0) 00:42:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f", 0xee}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:26 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x604, 0x603}], 0x0, &(0x7f0000000000)) 00:42:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa200}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, 0x0, 0x0) 00:42:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x8}, 0x0) 00:42:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, 0x0, 0x0) 00:42:27 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x700, 0x603}], 0x0, &(0x7f0000000000)) 00:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa300}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:27 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x900, 0x603}], 0x0, &(0x7f0000000000)) 00:42:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x0, @multicast1}, 0x10) 00:42:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x300}, 0x0) 00:42:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x0, @multicast1}, 0x10) 00:42:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b87", 0xf0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:27 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xa00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x2}, 0x0) 00:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb800}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x0, @multicast1}, 0x10) 00:42:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x78) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000006444000000000000000000000040000000e8000000000000000000000000090000000038edff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000df000000"], 0x78) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x185a83, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000002000004000000000000000000000000000000000b02c22e2576000000000003800"/120], 0x78) openat(r1, &(0x7f0000000040)='./file0\x00', 0x181000, 0x78) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) 00:42:27 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292", 0xd9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:27 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb18, 0x603}], 0x0, &(0x7f0000000000)) 00:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb900}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x3}, 0x0) 00:42:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) bind$unix(r4, &(0x7f0000000100)=@file={0x0, '.\x00'}, 0x6e) 00:42:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b87", 0xf0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:28 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xba00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x4}, 0x0) 00:42:28 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000004b6beac0000000000000003800000000000000000000000000000000000000000000000000000000000000000000008000"/120], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:28 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x8}, 0x0) 00:42:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292", 0xd9}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:28 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbb00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:28 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000050000000000fcffffffffffffff40000000000000000000000000000000003800"/115], 0x78) openat(r0, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf}, 0x0) 00:42:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b87", 0xf0}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:29 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe01, 0x603}], 0x0, &(0x7f0000000000)) 00:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbc00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x10}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x800}]}, 0x1c}}, 0x10) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="080000000200000001000000010400003125a19645dd5fdc96cb203d0d60b0b87787424056639c691e6a5aee1d676ef6a7caf3740023cedb235f"], 0x800) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000140)={0x4, 0x14, 0xb37c, 0x6, 0x20, 0x6, &(0x7f0000000100)="51c46d320adc4f201ff0c1ae0243d29fe5bdda8ef3487c2bbe04441b127b3e07"}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000000000000000000040000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000806dbdbb2fd01f1c75dace"], 0x78) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x60}, 0x0) 00:42:29 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbd00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050f018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 00:42:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x300}, 0x0) 00:42:29 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1020, 0x603}], 0x0, &(0x7f0000000000)) 00:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbe00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x202100, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x0, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:30 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1100, 0x603}], 0x0, &(0x7f0000000000)) 00:42:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xec0}, 0x0) 00:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbf00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) (fail_nth: 1) [ 805.022037][T30372] FAULT_INJECTION: forcing a failure. [ 805.022037][T30372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 805.035135][T30372] CPU: 1 PID: 30372 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 805.043984][T30372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.054045][T30372] Call Trace: [ 805.057320][T30372] [ 805.060244][T30372] dump_stack_lvl+0xd6/0x122 [ 805.064833][T30372] dump_stack+0x11/0x1b [ 805.068998][T30372] should_fail+0x23c/0x250 [ 805.073422][T30372] should_fail_usercopy+0x16/0x20 [ 805.078475][T30372] _copy_from_user+0x1c/0xd0 [ 805.083070][T30372] move_addr_to_kernel+0x7e/0x110 [ 805.088176][T30372] __sys_bind+0xd6/0x1b0 [ 805.092477][T30372] __x64_sys_bind+0x3d/0x50 [ 805.097050][T30372] do_syscall_64+0x44/0xd0 [ 805.101524][T30372] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 805.107424][T30372] RIP: 0033:0x7f690b1d2af9 [ 805.111833][T30372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 805.131441][T30372] RSP: 002b:00007f690a949188 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 805.139854][T30372] RAX: ffffffffffffffda RBX: 00007f690b2e5f60 RCX: 00007f690b1d2af9 [ 805.147829][T30372] RDX: 0000000000000010 RSI: 0000000020008ff0 RDI: 0000000000000004 [ 805.155840][T30372] RBP: 00007f690a9491d0 R08: 0000000000000000 R09: 0000000000000000 [ 805.163808][T30372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 00:42:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf00}, 0x0) 00:42:30 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x11c8, 0x603}], 0x0, &(0x7f0000000000)) 00:42:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) (fail_nth: 2) 00:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc400}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:30 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x11fb, 0x603}], 0x0, &(0x7f0000000000)) [ 805.171779][T30372] R13: 00007fff6be7118f R14: 00007f690a949300 R15: 0000000000022000 [ 805.179759][T30372] 00:42:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x4b4b}, 0x0) [ 805.253866][T30772] FAULT_INJECTION: forcing a failure. [ 805.253866][T30772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 805.266973][T30772] CPU: 1 PID: 30772 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 805.275738][T30772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.285787][T30772] Call Trace: [ 805.289139][T30772] [ 805.292060][T30772] dump_stack_lvl+0xd6/0x122 [ 805.296645][T30772] dump_stack+0x11/0x1b [ 805.300849][T30772] should_fail+0x23c/0x250 [ 805.305262][T30772] should_fail_usercopy+0x16/0x20 [ 805.310320][T30772] _copy_to_user+0x1c/0x90 [ 805.314755][T30772] simple_read_from_buffer+0xab/0x120 [ 805.320213][T30772] proc_fail_nth_read+0x10d/0x150 [ 805.325239][T30772] ? proc_fault_inject_write+0x230/0x230 [ 805.330882][T30772] vfs_read+0x1e6/0x750 [ 805.335096][T30772] ? __fget_files+0x20d/0x220 [ 805.339851][T30772] ksys_read+0xd9/0x190 [ 805.344003][T30772] __x64_sys_read+0x3e/0x50 [ 805.348564][T30772] do_syscall_64+0x44/0xd0 [ 805.352980][T30772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 805.358931][T30772] RIP: 0033:0x7f690b1856ac [ 805.363426][T30772] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 805.383031][T30772] RSP: 002b:00007f690a949170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 805.391484][T30772] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f690b1856ac [ 805.399456][T30772] RDX: 000000000000000f RSI: 00007f690a9491e0 RDI: 0000000000000005 [ 805.407503][T30772] RBP: 00007f690a9491d0 R08: 0000000000000000 R09: 0000000000000000 [ 805.415530][T30772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 805.423494][T30772] R13: 00007fff6be7118f R14: 00007f690a949300 R15: 0000000000022000 [ 805.431463][T30772] 00:42:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x0, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000001000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000005620eddfbd32cb913700"/129], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:31 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1200, 0x603}], 0x0, &(0x7f0000000000)) 00:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe103}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x6000}, 0x0) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0xa, 0x4e20, @multicast1}, 0x10) 00:42:31 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1518, 0x603}], 0x0, &(0x7f0000000000)) 00:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:31 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1718, 0x603}], 0x0, &(0x7f0000000000)) 00:42:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x610480, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c46000000000002000000000000000000000000000000000000000000004000000000000000000015000000000000000000000038000000000000000000000000000000000000007f9dabee000000c401e3a2c6a2d14500"/117], 0xfffffffffffffdb4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000180)={'#! ', './file0', [{0x20, '-'}], 0xa, "c46eaeeba6106a7afdcb6f3f971898be98dee5e6e8502fcc5a740dd8ea6ab5319f4e57bd2439ae63353a3dbcebdf27362f201e6a96467a6cbf1fe5e321143a211da9eb6a280c49a2dcefa572a5d57dd872b31cb74c0d2d9805cdd3f1c9ad8ec775e45ec344641bdbe84c94755158b008e0138b4bfa703fe0a1056f9cecc9d33798c6b6e21041e3087242ff161fad34a238b565543835c77aaba1ecb176d4ee5fa5746e57e28e4f2ac3688fc010b82fa0ed37390565146f3e3cc4939ece17c227d4f01cf0c7bd0596c40d1796b443463160baf19135338c66422d247471b21a07b17d"}, 0xef) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1=0xe0000002}, 0x10) 00:42:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x0, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xc00e}, 0x0) 00:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ed6e6}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:31 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x180b, 0x603}], 0x0, &(0x7f0000000000)) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1=0xe0000016}, 0x10) 00:42:31 executing program 1: pipe2(&(0x7f0000000240), 0x84800) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x200040, 0x0) write$binfmt_elf64(r4, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "0c37dec2da13cb25a3662c1cf05bbc816887244af9ed7b69ead52b5116b02d5e04faadd83e4961c93ba4a2ce07f9790d610ec22accbde8efad7295feafaefef7ee6359517bc895bef4a811fe7b635492dd8bdce63f1cd874b2bb842558010c44ae9065c89f38be2b278295ee85b019d35b38a689669989610d90ba36f5ac4822f3431ab965dbc70fdab7dade70f36558f87a1289f64ebafae606ed5e9004aaadbb5035fe34c0429c03747f802860be9078f4391a2e9a4ab457f9528ee10ae94cf2b533ce"}, 0x13c) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:31 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1815, 0x603}], 0x0, &(0x7f0000000000)) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x2) 00:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x30) 00:42:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x34000}, 0x0) 00:42:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000040000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000005c0c00000000000000000000000000000000000000000000000000000000000063038800"/123], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x50) 00:42:32 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1817, 0x603}], 0x0, &(0x7f0000000000)) 00:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x400300}, 0x0) 00:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c5047}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x0, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:32 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}, 0x78) readlinkat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/75, 0x4b) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 00:42:32 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1822, 0x603}], 0x0, &(0x7f0000000000)) 00:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x20009000) 00:42:32 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800"/120], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x1000000}, 0x0) 00:42:32 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1830, 0x603}], 0x0, &(0x7f0000000000)) 00:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0xc, @multicast2, 0x4e22, 0x2, 'nq\x00', 0x15, 0x8, 0x34}, 0x2c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r2, &(0x7f0000000900)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000008c0)={&(0x7f0000000100)={0x7b0, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4a44, 0x33}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xb9, 0xfa, "e76a906ba7403ee4977b5d2a3339fef03121b6d904595bfe67b9f315f47bc0b5646f80329beaba4f9a688e8d61cf825901b9ad6f1cc0d72a3b3b6685d40a94e00bee19cb7d0ebdffc251d66a4160b95a284ac932af6a8c4ef95938f57e28901e7047d72df1d40d12a87cc8ffc150dfbc8fc1d4202337896836df83294e312d7670d6162beb658d3ee07993a6effd97edfe79be92a1a67a9f3f2fd051d671f457448597caf406537c2ec18650722b9f943b28b874ec"}, @NL80211_ATTR_FILS_ERP_REALM={0x100, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_RRK={0xcb, 0xfc, "25a691c030facb09a25caabf2b31328c84885475ec688034288f89a303d2e17cfb1bc14d0f7e2a70aa7db16a621db01032c97de2b34cd01af5765c85e26316aeff5170f4d0a70658e531fda778c9e18b46f82a5f689307d3be06a5252976b744b3a3dae211509cdab0c3c1b9505bb714b1acebbbd76f8e9006df550a9e4483d84f1471c65fab3d06485ee9e41c1347367893f40b6246dcc4912f0803976bf88fa94a56ecb76fb45cd11e7a43316512df9c410d523073f217a1e023eedf69d413ad7477b3fc86da"}, @NL80211_ATTR_FILS_ERP_REALM={0x2d, 0xfa, "b666c3448a967daea6a752663b2999089b11a005f6090371372d7d49456a887a21e2a5bd346b7420e1"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x5a}], @NL80211_ATTR_IE={0xce, 0x2a, [@supported_rates={0x1, 0x2, [{0x36}, {0x48}]}, @dsss={0x3, 0x1, 0x34}, @fast_bss_trans={0x37, 0xbc, {0xaa, 0x4, "67700236aac1df14e8193a0ba21fd0eb", "3bb3f42104890e037a7e41d66e71a41d0c32d5424d948d98ac44938bc33f2362", "f7c7d9fd996078c6cb8e72b0c440d784a25d25792e65966c25571a4e2ca1b651", [{0x4, 0x1d, "9d80c183bf1a4eb398a98381a3091df33dc8cf5eea0c558e996b068c5b"}, {0x4, 0x26, "4ad34a2a62521e58b8807b5b9d648eee181b2362f41a32757fef1e3ca75c1c49c0fc32bdf044"}, {0x3, 0x1f, "469a9515c252ff3231c4622aa60f871d0e108dca67611118a56820bf3381ed"}, {0x3}]}}, @channel_switch={0x25, 0x3, {0x0, 0x68, 0xe3}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x32, 0xfc, "f0f1aca8c6d8c69663ce5365dbfba3998ef90b27a47aae9a213e3fc7d5d9cbfa1bbec96f2af46f092f3fb16a4445"}], @NL80211_ATTR_IE={0x213, 0x2a, [@random_vendor={0xdd, 0xf3, "fbe8df54bd93784e36e76dff4e93d7f4d57f1c4ee902e0adef5b1715b49722537fbd1e7289ac8f0716a30985b04a51c7841d944c99a3d1b392c143167fe3d831be6bbea868508ad9893a1b9bb692b1ea30047fee02ff0d5f19eaa969bcfbf04979712d215b23e7051216df1108db326f4e1179aaf08bb2f2faf987801e34a215f6708e0f1fa86fc439a3a79e9155fe8b40966473538c765aa6f25a02ca9dbdf2d3f16573d47dc4ea9b86dc55490a7bff5b758e3fdf7855f5c90d18d9f502e06443fb6c43ac5999ddf77c3f65a7cb1662fac4a8e792138579456a1a8bb543d879cb8c6cd2c49d0879ecdef882854987206bcf8d"}, @mesh_config={0x71, 0x7, {0x1, 0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2, 0x40}}, @mic={0x8c, 0x18, {0xf7a, "016768d6597e", @long="6060eac0633e73cb0d2c98c618e5a822"}}, @peer_mgmt={0x75, 0x16, {0x1, 0x2, @void, @val=0x27, @val="d9ee8c9b6ea9937f93a69feb5b86f290"}}, @ht={0x2d, 0x1a, {0x1000, 0x1, 0x0, 0x0, {0x5, 0x1, 0x0, 0x3f, 0x0, 0x1, 0x1, 0x1}, 0x181, 0x4b, 0x8}}, @measure_req={0x26, 0x8f, {0x5, 0x5, 0x90, "bc68756949de9bb0f0811dfc9319d163b6ee81282848cb459c4c50176d7e8853aa7ae2516770dafef79deba508bba1597d92163dcf4c066d3bf8f6d1ad78ca4cec8080aa5625076d721af79c46a9c90bc18a1010eedf6bd3ed23be1b69aa9e7e25de23d5a4f0556963f2bec60df423a6a89e2e58f7c67bb129d014b4d347a20bbf96dc0c21f7c2bf5801c65c"}}, @cf={0x4, 0x6, {0x9, 0xff, 0x100, 0xe3}}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @prep={0x83, 0x25, @ext={{}, 0x3f, 0x1f, @broadcast, 0x400, @broadcast, 0x4, 0x85b6, @device_b, 0x4}}]}, @NL80211_ATTR_IE={0x1ad, 0x2a, [@fast_bss_trans={0x37, 0xc5, {0x6, 0x6, "87400145085341da2c17ddfd7232975c", "2de80648370314f5f107f57e3515346769afbfac3b9a48a0ad0f9bdb11e42e83", "81d61c88d4af35d70a7af882cf3b264866e90e09416feec77ef8a63b03f6b653", [{0x4, 0x1f, "6b3399591f4631fad735f073368f98d91a874ea147d31ae60eff416d72f253"}, {0x2, 0xf, "969434360b50e97b2b4e91cf4eece8"}, {0x2}, {0x2, 0x1a, "8450cc718953f1c4ebc807579035144b91209291c59a47dd5b77"}, {0x4, 0x10, "32ed71f6980d0020eeae5ecd4f68271f"}, {0x1, 0xf, "78957852bfd1b4cba959255ec0257e"}]}}, @chsw_timing={0x68, 0x4, {0xb6, 0xfff}}, @cf={0x4, 0x6, {0x4, 0x0, 0x0, 0xaa3}}, @channel_switch={0x25, 0x3, {0x0, 0xa, 0x1}}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @measure_req={0x26, 0xb3, {0x9, 0x9, 0x9, "62b3bd72162769a3df0551eb6253e1bac10684354d9a4e52ab26857dd8bd44f8351324e54f4633aebedafb9f78db5bd8e7263f63a413b67c2f9f050223f822ff92c8f1177927d1a42461747cc7df5579e6d2afbad4151c88e185323ae39b2990c6ecd78e440188d240437044169b71e726d3937b957e54db70d04c1be079f8325ee3fff4d7dedd5653aba3a1b37ab3b0499bc025b9cff140b080380792624c0270f3dfb5bc52f0f510c54de9989af19f"}}, @sec_chan_ofs={0x3e, 0x1}, @link_id={0x65, 0x12, {@initial, @device_b, @device_b}}]}]}, 0x7b0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:32 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1834, 0x603}], 0x0, &(0x7f0000000000)) 00:42:32 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) [ 807.399621][T32732] IPVS: set_ctl: invalid protocol: 12 224.0.0.2:20002 [ 807.434448][ T414] IPVS: set_ctl: invalid protocol: 12 224.0.0.2:20002 00:42:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x0, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:33 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1902, 0x603}], 0x0, &(0x7f0000000000)) 00:42:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x2000000}, 0x0) 00:42:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) listen(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x8, 0x800}) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000f55000000000000000000000000000000000000000000000004af16ebca1bff6000000000000000000000000000000000000000000000000000000000000001100"/127], 0x78) openat(r2, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) fchmodat(r5, &(0x7f0000000100)='./file0\x00', 0x1a) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x78) perf_event_open(&(0x7f00000003c0)={0x9, 0x80, 0xc7, 0x7f, 0x1, 0x7, 0x0, 0x7, 0x2, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x4001, 0x5, 0x8f67, 0x5, 0xed, 0xffff8000, 0xb5, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x5, 0xffffffffffffffff, 0xb) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r1) 00:42:33 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1903, 0x603}], 0x0, &(0x7f0000000000)) 00:42:33 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x3000000}, 0x0) 00:42:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x602480, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000280)="c4ed679d9427bcabd35996ecd0430a3ecd95b74f7a0cb8fc09edcc07d231e5c8cfe5f7d5f84482ef08777ca1525796cc03f8f8a41937c4c2653bb10568efc8c6d90a790c08e8e55d7c7c2ebdcb04dd92d62b5ce6a3df72dcc73a27cea5aa0a66d90137c321fea045d2828f985464dc0ba4aba9ac7711e1a074252fee091cb93bd11fb9c66ef1dbfd939b95775fce1a0ccf74a2f513bba13ccbc14075f2d01dfeafbba0600e066d3ca124764698269809539c6488fbc7c9e8fd183cb668c34edb343be7e3ab35dc35dc1f90382ed2e98719448cfb8af4f0405021bef6da88348116067c70ca2a4c1fc82cac5405948548a880001ac8c345693cef576c2c109c37") ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) listen(r1, 0x8) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x0, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:34 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2010, 0x603}], 0x0, &(0x7f0000000000)) 00:42:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x600080, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat(r1, &(0x7f0000000080)='./file0\x00', 0x181000, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 00:42:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x4000000}, 0x0) 00:42:34 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2200, 0x603}], 0x0, &(0x7f0000000000)) 00:42:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040)=0x9, 0x4) 00:42:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = signalfd(r0, &(0x7f0000000080)={[0x81]}, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x83, &(0x7f0000000040)=@assoc_value={r4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={r4, 0xa4, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x8001, @remote, 0xa9}, @in6={0xa, 0x4e20, 0x9, @loopback, 0x8b}, @in={0x2, 0x4e20, @rand_addr=0x64010102}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x3, @loopback, 0x7}, @in={0x2, 0x4e20, @rand_addr=0x64010102}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={r5, 0x5}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000280)={0x0, 0x9}, 0x8) sendto$inet6(r0, &(0x7f0000000100)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 00:42:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x8000000}, 0x0) 00:42:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:34 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2218, 0x603}], 0x0, &(0x7f0000000000)) [ 809.159027][ T24] kauditd_printk_skb: 166 callbacks suppressed [ 809.159040][ T24] audit: type=1400 audit(1639096954.645:1631): avc: denied { name_bind } for pid=1508 comm="syz-executor.1" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 00:42:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x0) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf000000}, 0x0) 00:42:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) listen(r1, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfff) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000200)={{r1}, 0x0, 0x2, @inherit={0x90, &(0x7f0000000140)={0x1, 0x9, 0xffffffff00000001, 0xffff, {0x20, 0x4923b6d0, 0x3, 0xffffffffffffff5a, 0x80000000}, [0x3, 0x40, 0x16, 0x1f1, 0x7ff, 0x0, 0x3b6, 0x46677e70, 0x78]}}, @subvolid=0xd6d}) 00:42:35 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2500, 0x603}], 0x0, &(0x7f0000000000)) 00:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x78) getsockname$packet(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x14) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000240)) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r3 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x80000, 0x0, 0x10}, 0x18) r5 = fsmount(r4, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.stat\x00', 0x300, 0x0) dup2(0xffffffffffffffff, r1) 00:42:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x4b4b0000}, 0x0) 00:42:35 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3018, 0x603}], 0x0, &(0x7f0000000000)) 00:42:35 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000900)={0x0, 0x1000}, &(0x7f0000000940)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000980)={0xc8f, 0x7, 0x20c, 0x1, 0xa, 0x80000000, 0x0, 0x101, r0}, 0x20) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r3 = socket$xdp(0x2c, 0x3, 0x0) recvmsg(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/226, 0xe2}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/155, 0x9b}, {&(0x7f0000000500)=""/132, 0x84}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/238, 0xee}], 0x9, &(0x7f0000000880)=""/45, 0x2d}, 0x20) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 809.956266][ T24] audit: type=1400 audit(1639096955.435:1632): avc: denied { mount } for pid=1859 comm="syz-executor.1" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 00:42:35 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3418, 0x603}], 0x0, &(0x7f0000000000)) 00:42:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="5d253222bd580028144fe6e18830ffbc41ff25184e3edd7c7f68a4b6ee207bc81784d58f2000e7e760bf8fb2c584993b3c2d50692f166e0742803df8b0ace7f18d31d60e930075b48555d12c3c1e1324e6a9dbba3e49633eff0354055c6729adea2098d4b229ce43544e433314975655db9c824b39eeb0779a0af562faffd671eb506719fab1d85b8eac452df153979ddbdf2c3a4a1f20fcae1129a1ee1cbdd7ab21a00cf25ad906d600", 0xaa, 0x4008004, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @private0}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000200)=0x3f, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180)=0x5, 0x4) 00:42:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x0) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:36 executing program 1: unshare(0x12020400) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x82, 0x2, 0x0, 0x0, 0x4004, 0x2}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) syz_mount_image$msdos(0x0, &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000e40)={0x0, 0x2, {0x5, @struct={0x2, 0xfffffffd}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0xa8, @usage=0x7ff, 0x1, 0x0, [0x0, 0x4, 0x8, 0x3, 0xfffffffffffffe01, 0xff]}, {0xb, @usage, 0x0, 0x80000001, 0xce7, 0x6, 0x0, 0x2000000, 0x20, @struct={0x0, 0x4}, 0x2, 0x8, [0x25a00000000000, 0x3ff, 0x6, 0x0, 0x1, 0xffffffffffff0000]}, {0x8, @usage, 0x0, 0x5, 0x7fff, 0xab, 0x9, 0x10001, 0x10, @struct, 0x0, 0x4, [0xffffffffffffff81, 0x2, 0x772, 0xe06]}, {0x100, 0x10001, 0xfffffffffffffff7}}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0000000000000057717fdd882fefba00"]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x81, 0x3f, 0x0, 0x0, 0x0, 0x5800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x48000000, 0x9, 0x2, 0xb558, 0x20, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x10, r3, 0xb) clone(0x40808000, 0x0, 0x0, 0x0, 0x0) 00:42:36 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3f00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x60000000}, 0x0) 00:42:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x800, 0x81) setgid(r4) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={r2, 0xffffffffffffffff, r4}, 0xc) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:36 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)="875104b0", &(0x7f00000000c0)=@tcp=r1, 0x1}, 0x20) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:36 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4102, 0x603}], 0x0, &(0x7f0000000000)) 00:42:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x9effffff}, 0x0) 00:42:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000001ea3b853da001a5aa00180000280cb88744320c757670c3a3c14f00", @ANYRES32=r0, @ANYBLOB="a3000000000000002e2f66696c653000"]) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r0}) sendto$inet(r3, &(0x7f00000000c0)="9af8e386acd63041b7e344d598a245efb34325a3d33ff1bf52ea0c7e096e", 0x1e, 0x8002, &(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c5b967a97d9c3a4a300000000000000000000000900020063797a31000000000900020073796a3100000000"], 0x2c}}, 0x80d4) listen(r4, 0x3ff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000180)={0x2, 'team_slave_1\x00', 0x3}, 0x18) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r6, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r6, &(0x7f0000008ff0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 00:42:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x0) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:37 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4202, 0x603}], 0x0, &(0x7f0000000000)) 00:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0xfffffffb, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x3c, 0x21, 0x71c, 0x70bd2b, 0x25dfdbfe, {0x2, 0x14, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x10}, [@FRA_DST={0x8, 0x1, @rand_addr=0x64010100}, @FRA_GENERIC_POLICY=@FRA_TABLE={0x8, 0xf, 0x5}, @FRA_FLOW={0x8, 0xb, 0x80}, @FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40840}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x55bb}}, './file0\x00'}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000001800)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f0000001840)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getchain={0x2c, 0x66, 0x20, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0xf, 0x1}, {0x4, 0x1}, {0x2, 0xe}}, [{0x8, 0xb, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000022c0)=@ipv6_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {0xa, 0x14}, [@RTA_ENCAP={0x8, 0x16, 0x0, 0x1, @MPLS_IPTUNNEL_DST={0x4}}, @RTA_OIF={0x8, 0x4, r6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x8}]}, 0x34}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r8 = getpgrp(0x0) syz_open_procfs(r8, &(0x7f0000000580)='net/ip_mr_cache\x00') r9 = openat$incfs(r2, &(0x7f0000000440)='.pending_reads\x00', 0x10000, 0x2a) sendmsg$nl_route(r7, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@RTM_NEWNSID={0x44, 0x58, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NETNSA_FD={0x8, 0x3, r2}, @NETNSA_PID={0x8, 0x2, 0xffffffffffffffff}, @NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8, 0x3, r9}, @NETNSA_PID={0x8, 0x2, 0xffffffffffffffff}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x11) 00:42:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xc00e0000}, 0x0) 00:42:37 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4702, 0x603}], 0x0, &(0x7f0000000000)) 00:42:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0xffffffff, 0x4, 0x3, 0x3, 0x2}, 0x14) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0xa000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:37 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0e17532f92cce20d799b5a0d74"], 0x8) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000003c0)={0x0, 0x80, 0x7, 0x7f, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xd7, 0x2, @perf_config_ext={0x1f, 0xd8}, 0x2020, 0x5, 0x0, 0x5, 0x6a, 0x4, 0x200, 0x0, 0x9, 0x0, 0x2}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffef7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='\x00', &(0x7f0000000280)='openpromfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="4fd9a52083451a54fab149d00d45bea57323b210c5e5c669da3ef92cd6a9d6d5de01deb10a8565423f6ff2c8e1577b08be00d2958198681708f53125061d780ccb1ad67cee90e3965fbaf40071df47121640161cc1de9bc7dc939a664c348ea4ef79176b430c8669393aed0886fd91", @ANYRES16], 0x1c) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, 0x0) 00:42:37 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4800, 0x603}], 0x0, &(0x7f0000000000)) 00:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x0, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xeaffffff}, 0x0) 00:42:38 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4c00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @multicast1}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000180), 0xd84, 0x8000) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f00000001c0), 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r5 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000280)=0x10, 0x80000) r6 = syz_open_dev$vcsu(&(0x7f0000000200), 0x8, 0x280800) setsockopt$sock_int(r6, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) listen(r5, 0x8) 00:42:38 executing program 1: prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_TIMERSLACK(0x1e) 00:42:38 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000380)={@loopback, @empty, 0x1, 0x1, [@broadcast]}, 0x14) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/nf_conntrack_sip', 0x40, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x80000001, 0x5, 0x78c, 0x5, 0x2, 0x12}, {0x3, 0x800, 0x800, 0x7ff, 0x6, 0x6}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000002c0)={0x8d, {{0x2, 0x4e23, @multicast1}}}, 0x88) 00:42:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xefffffff}, 0x0) 00:42:38 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6800, 0x603}], 0x0, &(0x7f0000000000)) 00:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:38 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) fcntl$dupfd(r2, 0x406, r1) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3f, 0x9, 0x81, 0x6, 0x0, 0x7, 0x1200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp, 0x10410, 0xff, 0x7, 0x1, 0x200, 0x0, 0x7ff, 0x0, 0x6, 0x0, 0x8000}, 0xffffffffffffffff, 0x6, r1, 0x3) clone(0x70224100, 0x0, 0x0, 0x0, 0x0) 00:42:38 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6c00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) sendmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)="64cfd8d6a1657a19b5cde51dc74e1b23e12911067bbab5da301a0ab0d57e1439f3d40f0b4a4a5cb547dc84a1056dfb110a48dafca6145272b003c141cd61d9ced3f95d4bfa54bf15c79651f14675d7bce718ce7cae58a11d95b40f9ca177f2f9076b1caeebd8b7238c6feda1dfeaaf44edd16b478387eca68b1d5c337b96f4f9f935c9c656f9f4df54444385ea53aca3f8a10395a1aae26219d0f71074738a48053037dea7d9d119a4", 0xa9}, {&(0x7f0000000200)="ea7918e9a3c3ec60c9708d8cba4dd1f54134dfb0737a1e1920b194c0d7fa06ac044f73a479f875a7d1159c673df72e7a19d2898833eddbeba980d1d1976ce6d7f8387bfb24664439cfb6984e773e4374ea332f66151de51e832592c5bc47a1b9b25ce3066fda03e6640b3b6c618cff250014eb0487703f32b756774e5d31abb07e706d36b5f419c70c33aff8af22205a3fdebb507ec5825e3abb32ff3e9a3740b942250b61a649c77a417a588979b8e20ffb61361c6c277f8a00da0c1f71b229c1e9d67889be18ab94981c7f84a9ac7ba6122a39ada2311fab2de9a5", 0xdc}, {&(0x7f0000000300)="1dbbd953e4af4d8c48dcf84970206501eda81be1e4dbd5670bd79b824be6588d9dae0fe8e6e1b1e0cf68c237c0aae59f63b491875b780c1b0fa12d2e98da828af48df55a2850377d92bb6ecc2e7af2ce653cf74fea4e4568037a9d25fba85edcfa0f78e3050d880605bc3dff128d5fb6810318e8ba00d0b36f9a8c56ee1a0f34e4385bf3", 0x84}], 0x3, &(0x7f00000003c0)=[{0xe8, 0x103, 0x5, "0591ae0cebd018ca71b565d4392ee42ff98adecc1c33e88dd78170cc0cbaf2e2d50462c029ded429e8481eaa91898a321e71f7f22d5948d88fe79398c58bafec89da397cea2cf55b30266f9680312a1e42602d73a23940db0b272a2187a7d623ca4d98c962f6f04d635c084bb1e9a2233582889ed733fe9f99a9bfc1527e95a727dd0c99869c9c0d1106725647637fd8c8fcaa51156479b91800f6f42e15a008ef51fe60cba820e6c32f97867f4e64d6742ce4549f978dd4bab637b6068b81ef535d1afed38caf4d2173be78b8b9e89b488c51db09"}, {0x48, 0x0, 0x508, "4567addf8e57a4d96d3ba0fb1b018b7eec317ddf2819113beb057618170c66403f4dce965dddf09ac00b899007d14efe0755de006d"}, {0x88, 0x10d, 0xffffffc0, "9c05b925446848c44436ee073b489b90df7622a0278b9394c4b8f0473b57157552eb0e94d7884c4a216fb55b64dd20e1f66861bcbd259497941c2fa5b39f602af8b08e383dd3dba0f8150cd9be6760d696a5e9fd867c628a8fa4f2a2fb04e6d89366fedd34e0ff7b95a3a009cd27d414c816f5978bbe"}, {0x50, 0x10c, 0x3f, "85d989b21fb618eb1992ae69aaf463c4a06a6ddb132d91789e83165e0300cc8033d23a3a5472e0de659fa1ea62dacbd61f6e8774ac20d49acd771df35db3a5"}, {0xe0, 0x6, 0xfffffdf7, "70164f018978d1f03282767a989afcd3aa0ec0f394c6df926c73405d9ebdd2083c628c58e269254780dff21f94660acf7b2668296546ddef67efbd7aebed6b86b39c184784faea4bdc2df1efd7efb7361c36643cb05b6fcbf0b77f117bea3cde926b8cc8f35bc9e077f674470971c9f0fac1da1722925fc27cc316b98480bc9413858810a909df9593daea113b7f903eabbf8d311c300dec14c1c3649aed3240206bf5e571cca68b2a822d7a424a12000924471b06213e869061071622a9c6621cf14aad04ab3ac78d3cb5662b78cc"}], 0x2e8}, 0xc041) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e24, @empty}, 0x10) 00:42:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x0, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf0ffffff}, 0x0) 00:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x11000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:38 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7400, 0x603}], 0x0, &(0x7f0000000000)) 00:42:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000029c0)=[{{&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000001240)=[{&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000040)}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, &(0x7f0000001280)=""/31, 0x1f}, 0x9}, {{&(0x7f00000012c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001340)=""/75, 0x4b}, {&(0x7f00000013c0)}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/145, 0x91}, {&(0x7f00000024c0)=""/138, 0x8a}, {&(0x7f0000002580)=""/23, 0x17}, {&(0x7f00000025c0)=""/222, 0xde}, {&(0x7f00000026c0)=""/39, 0x27}, {&(0x7f0000002700)=""/111, 0x6f}], 0x9, &(0x7f0000002840)=""/123, 0x7b}, 0x7ff}, {{&(0x7f00000028c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002940)=""/10, 0xa}], 0x1}, 0x4}], 0x3, 0x2102, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000002a80)=ANY=[@ANYBLOB="1c0000000706010100000000000000000038a47a54974f6a580000001af7720390e16914e342db4eb6dce78150af643a1502d35f8db5ad9a1a29247155ac7918ec9de8e84d7957438bc0d81b80ddc7ca12dcb62c72e50bbcc4e460113b87e3fe436f782900000000"], 0x1c}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x2d, &(0x7f0000000080)=0x48, 0xfffffffffffffe38) listen(r0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xfeffffff}, 0x0) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7800, 0x603}], 0x0, &(0x7f0000000000)) 00:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7a00, 0x603}], 0x0, &(0x7f0000000000)) [ 813.536019][ T4345] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 813.597000][ T4584] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:39 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@link_local, @empty, @val={@void}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) syz_emit_ethernet(0x19, &(0x7f0000000040)={@random="97b19a27acb1", @broadcast, @void, {@llc={0x4, {@llc={0x1, 0xfc, 'P*', "1909109c7e920f"}}}}}, &(0x7f0000000080)={0x0, 0x3, [0x6e7, 0xa46, 0x9eb, 0x10e]}) 00:42:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffff7f}, 0x0) 00:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x0, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8100, 0x603}], 0x0, &(0x7f0000000000)) 00:42:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0xf, &(0x7f0000000080)) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x2, 0x20, 0x0, 0x0}) clone(0xf70a86956630e51d, 0x0, 0x0, 0x0, 0x0) 00:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffff9e}, 0x0) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8900, 0x603}], 0x0, &(0x7f0000000000)) [ 814.381621][ C1] sd 0:0:1:0: [sg_rq_end_io] Sense Key : Illegal Request [current] [ 814.389666][ C1] sd 0:0:1:0: [sg_rq_end_io] Add. Sense: Invalid command operation code 00:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x25000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x9d05, 0x603}], 0x0, &(0x7f0000000000)) 00:42:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x7fff, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7f}}, 0x0, 0x0, 0x15, 0x0, "6bf6bda48a94f33665b2608709dbec0880483e0c88cae48e6a2dd9ca6d47e95845c97398ca75be72a037e23dde072010d21b7fa4f8a1f8a10006a47a1058fc0c58d006c4bbe33f4523488422305a821c"}, 0xd8) 00:42:40 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb801, 0x603}], 0x0, &(0x7f0000000000)) 00:42:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffffea}, 0x0) 00:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x34030000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0xffffffffffff0001, 0x10000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 00:42:40 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xbd01, 0x603}], 0x0, &(0x7f0000000000)) 00:42:40 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000100)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_DEVKEY={0x30, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0xffffffffffffffcd}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0x4}]}]}]}, 0x4c}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x3c, r0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040040}, 0x40000) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/103, 0x67}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000280), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000300)=""/144, 0x90}, {&(0x7f00000003c0)=""/66, 0x42}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/112, 0x70}], 0x6}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000800)=""/207, 0xcf}], 0x1, &(0x7f0000000940)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x108}}, {{&(0x7f0000000a80)=@abs, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/225, 0xe1}], 0x1, &(0x7f0000000c40)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}}], 0x4, 0x20, &(0x7f0000000e80)={0x77359400}) clock_settime(0x2, &(0x7f0000000ec0)={0x77359400}) syz_emit_ethernet(0xae, &(0x7f0000000440)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x78, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffefffa0f8ca1cc8000800"}]}}}}}}, 0x0) syz_emit_ethernet(0xa8, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa1eaaaaaaaaaabb08066252cfc47bfea96666e1d97a843ac563a77412b070a9df337f80c778151bb98187781b3992d060a9008d6bdf8a05038863c9b3e0902b0259ef9920cfd07c180533b8268e2a00f1b87c8ef6388d937ccfb7b9df67a4ef704c9ab73d8e387f2bdd3d02cb0cf62df15180603c9e7ba7981dba0ff316950b939040166e0e74f6f5cdea69a1c2a48f962a4d100a5b70032c8c2195eebbdac854091a40"], &(0x7f00000000c0)={0x1, 0x3, [0x700, 0xd62, 0x3f2, 0xde7]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) quotactl(0x6, &(0x7f0000001040)='./file0\x00', r6, &(0x7f0000001080)="ef3e1243aa0629931991e72e221cd92737fda7cd12ec7b0bc8abbc5522f8c4a03fae87a3ab142cebe71b602a528565ee78edacbf023490f29262d6caae739fe08297bbbe31d964f0076862375b42e6ee1deab53ae8223dd1bdabf098d0aa5e80e030fc18487220b6cee026f18fab157a312f05efe6ea78d3cddb3d971b38ebea0e0716cc440319f2c7ac808a70c353fcfe9f8bb54f75c82503db4a56c9325daa8c5ef406a20fef3e4cbeca13bf1e674ec7e774916c4d544e39db0ce5fe25167e1fea69ffaf") 00:42:40 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xbe01, 0x603}], 0x0, &(0x7f0000000000)) 00:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) setsockopt$sock_int(r2, 0x1, 0xc, &(0x7f00000000c0)=0x2, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040)=0xe0, 0x4) 00:42:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffffef}, 0x0) 00:42:40 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc305, 0x603}], 0x0, &(0x7f0000000000)) 00:42:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}, @TCA_CTINFO_ACT={0x18}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@delqdisc={0xdc, 0x25, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x5}, {0x3}, {0x7, 0x90e69f4cebc6b7c4}}, [@TCA_STAB={0xb0, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x8, 0x2, 0xc000, 0x5, 0x0, 0x3, 0x8, 0x2}}, {0x8, 0x2, [0x4, 0x1]}}, {{0x1c, 0x1, {0x1, 0xfe, 0x3, 0x3, 0x0, 0x1, 0x3ff, 0x5}}, {0xe, 0x2, [0x3, 0x94, 0x2, 0x4, 0x2]}}, {{0x1c, 0x1, {0x7f, 0x81, 0x9, 0x84, 0x0, 0x4, 0x7, 0x3}}, {0xa, 0x2, [0xff0a, 0x7ff, 0x6]}}, {{0x1c, 0x1, {0x5, 0xce, 0x9, 0x8, 0x0, 0x7f, 0x6, 0x9}}, {0x16, 0x2, [0x62, 0xcc1, 0x5, 0x1, 0x7, 0x6, 0x7ff, 0x0, 0x8]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4004}, 0x4000081) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) close(r2) 00:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x47504c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:41 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc811, 0x603}], 0x0, &(0x7f0000000000)) 00:42:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4116f61c}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={r2, 0x3, 0xa, [0xfff8, 0x9, 0x5, 0x9, 0xfffd, 0x6, 0x8, 0xfa0, 0x3d8, 0x6]}, 0x1c) 00:42:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xfffffff0}, 0x0) 00:42:41 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd800, 0x603}], 0x0, &(0x7f0000000000)) 00:42:41 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '^'}, {0x20, ':\'/#\\\\'}, {0x20, '%{^('}, {}, {0x20, ',#{@-'}, {0x20, ')#\xc4${'}, {0x20, '\\\'{\\+&:\t'}, {}, {0x20, '\'#'}, {0x20, ';)/*$'}], 0xa, "8f4a16abf86454d08fba1f585561faadd39a8f7b0434ce7777cf20ce78152e0f"}, 0x59) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 815.785255][ T5874] loop1: detected capacity change from 0 to 7 [ 815.800515][ T5874] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:41 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xdf00, 0x603}], 0x0, &(0x7f0000000000)) 00:42:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) 00:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xfffffffe}, 0x0) 00:42:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:42 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x16, 0x3f, 0x3, 0x2f, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_x_policy={0x8, 0x12, 0x4, 0x3, 0x0, 0x6e6bb3, 0x9, {0x6, 0x2b, 0x3, 0x80, 0x0, 0x9, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x3d}, @in=@multicast1}}, @sadb_ident={0x2, 0xa, 0xffff, 0x0, 0x7}, @sadb_address={0x5, 0x5, 0x6c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x80000000, @empty, 0xff}}, @sadb_sa={0x2, 0x1, 0x4d3, 0x0, 0x3, 0x92, 0x3, 0x1}, @sadb_x_sec_ctx={0x1c, 0x18, 0xff, 0x3f, 0xd2, "234cf150ec0cfd315f10f866a7e83e2d58bcac313940212d2d10d1d5e2c13978611713e5435833fd360a6c25f8e8d56efea5b2817290f73f807e565420ceea3c34c7648dc51738ce4f4d4cffbc12368ad2a642b671b3c9a08a0b2beb961404419c7cbba57194c41380f2fddaa7ccda2d5e48808208082f7afb7945857d733c08fea4e2145bbb523c28736e6aa58568cc6267e9442ca2c5dc807bea32da0b2f6656943a0e59a742f3416da8ea073880cfb4f614b646b2f123a0302cb188f5ebba2a611380cad4fe9ed997fb8d89a657ce2aad"}]}, 0x178}}, 0xc0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, &(0x7f0000000280)=0x7fff, 0x4) 00:42:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) close(r2) 00:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x49000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x40030000000000}, 0x0) 00:42:42 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe100, 0x603}], 0x0, &(0x7f0000000000)) [ 816.667039][ T24] audit: type=1400 audit(1639096962.145:1633): avc: denied { setopt } for pid=6401 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 816.690796][ T6405] loop1: detected capacity change from 0 to 7 00:42:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x100000000000000}, 0x0) 00:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:42 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xedc0, 0x603}], 0x0, &(0x7f0000000000)) [ 816.730634][ T6405] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:42 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfb11, 0x603}], 0x0, &(0x7f0000000000)) 00:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x200000000000000}, 0x0) 00:42:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) close(r2) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfeff, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x38, r4, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0xfe33}]}, 0x38}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x52}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x3dac4325674f9230}, 0x8004) sendto$inet(r2, &(0x7f0000000180)="4ed23ebebe3d14211129aa3b76145a5ac3c419e616da138967b9a885ff5df14a3da386356aedaa7fa42b58bb067ef7ba34e026ffc7d4081c36e32f", 0x3b, 0x4000040, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xff0f, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffe, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x300000000000000}, 0x0) 00:42:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x80000, 0x603}], 0x0, &(0x7f0000000000)) [ 817.563616][ T7036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 817.573426][ T7035] loop1: detected capacity change from 0 to 7 [ 817.582046][ T7140] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 817.598449][ T7035] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) close(r2) 00:42:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [0x10001, 0x3f, 0x9, 0x37b1, 0x10001, 0x4]}, &(0x7f0000000240)=0x78) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e21, 0x4078, @private0, 0x6}}, 0x0, 0x0, 0x26, 0x0, "7a7a38ee3140f30c3e6e8cfbd6732a0b6564fe3a9ddea6c99e80439fb76580cf6ad520a3995b805559191fa9bd310fe5a73100af2d9cb8dd1b1a2e662e26832d9548fb3f5042ceabdbf70b921e64d8c1"}, 0xd8) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) 00:42:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x400000000000000}, 0x0) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x80040, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe0000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) sendto$inet(r1, &(0x7f00000000c0)="bd9fdeb424a38f23c41f8c7a07f77f3a08cf613f19fce4bbbf9b9f9a417eab624c24c24a2c5290a7babc3e96898428086239f31247ae4cd045d50d947f3e981ff09a8a546306c72ccf43b3a9f0037c40af72b6dd0acf56a6a971757ac4c0b11d083e19475e853264d534c23e886389c1daa648c76a3d48586a9763944b332420228002a2152fde5b04319ca5d84875", 0x8f, 0x4000000, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:43 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x400000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x800000000000000}, 0x0) 00:42:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) socket$pppoe(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000240)=0x3ff, 0x5b) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="090000000100d74be7640025238e0000ca352e268b81799e4e4bcd31f842921850401c384fda313db90640f1a87de53b4475f0e7c307371c8f604c79cec9dbc2fb231e1bf1f25635f186c86819401c01bd161aeac9f93b8a87e8a8b5010000004a27a20124efa39834"]) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0}, 0x0) io_uring_enter(r2, 0x2ff, 0x0, 0x0, 0x0, 0x0) listen(r0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) [ 818.419239][ T7468] loop1: detected capacity change from 0 to 7 [ 818.444258][ T7468] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:44 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf00000000000000}, 0x0) 00:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x50000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 00:42:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket(0x2a, 0x80000, 0x4) r3 = syz_io_uring_complete(0x0) r4 = accept$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) sendto$inet(r4, &(0x7f0000000180)="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", 0x1000, 0x20000000, &(0x7f0000001180)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r5, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f00000000c0)) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000011c0)=0xffffffffffffffff, 0x4) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffff0001, 0x50c}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fffffff}}, './file0\x00'}) 00:42:44 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x10e0000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10, 0x80800) getpeername$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000200)=0x10) 00:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x51000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:44 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x4b4b000000000000}, 0x0) [ 819.293953][ T8000] loop1: detected capacity change from 0 to 7 [ 819.312977][ T8000] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) socket$nl_netfilter(0x10, 0x3, 0xc) [ 819.399985][ T8318] loop1: detected capacity change from 0 to 7 [ 819.419074][ T8318] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:45 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2040000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x6000000000000000}, 0x0) 00:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x52000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 00:42:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000040)={0x1, 0x5, 0x2}) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="d6231cb8f908b0730fd83207f3b6e9753a76dc54671180ef5d0e9bdbcfaea498c7a0e8355358215dee1b8e1b4bf4d7dfdbc35b839b16237714beea", 0x3b, 0x20000000, &(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e20, @private=0xa010102}, 0x10) 00:42:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x8000000000000000}, 0x0) 00:42:45 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2190000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:45 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x53000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 820.179503][ T8434] loop1: detected capacity change from 0 to 7 [ 820.218804][ T8434] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:45 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3190000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 00:42:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 00:42:46 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:46 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x5000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58030000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xc00e000000000000}, 0x0) 00:42:46 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6000000, 0x603}], 0x0, &(0x7f0000000000)) [ 821.096237][ T9060] loop1: detected capacity change from 0 to 7 [ 821.135890][ T9060] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:46 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6040000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xeaffffff00000000}, 0x0) 00:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x59000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:46 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 00:42:47 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xefffffff00000000}, 0x0) 00:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:47 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x9000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:47 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xa000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 00:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:47 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb000000, 0x603}], 0x0, &(0x7f0000000000)) [ 821.938589][ T9690] loop1: detected capacity change from 0 to 7 [ 821.978493][ T9690] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xfeffffff00000000}, 0x0) 00:42:47 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb180000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x12d) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 00:42:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 822.814037][T10328] loop1: detected capacity change from 0 to 7 [ 822.834553][T10328] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000001000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b3c214d5fc13398e02702cd61eaa9411f4b2a3f74416eb5c9bec"], 0x78) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:48 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) [ 822.912207][T10586] loop1: detected capacity change from 0 to 7 [ 822.925718][T10586] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x2}, 0x0) 00:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x10000000, 0x603}], 0x0, &(0x7f0000000000)) [ 823.716000][T10951] loop1: detected capacity change from 0 to 7 [ 823.736721][T10951] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x3}, 0x0) 00:42:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x11000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x60000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:49 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x12000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x4}, 0x0) [ 823.826598][T11188] loop1: detected capacity change from 0 to 7 [ 823.881166][T11188] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x15180000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x8}, 0x0) 00:42:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x17180000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x20000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xf}, 0x0) 00:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x62000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x20100000, 0x603}], 0x0, &(0x7f0000000000)) [ 824.576222][T11589] loop1: detected capacity change from 0 to 7 [ 824.605644][T11589] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x22000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x60}, 0x0) 00:42:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f00000012c0)={@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}, 0xc) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8001, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)={0x0, ""/256, 0x0, 0x0}) r6 = socket$can_raw(0x1d, 0x3, 0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000019680)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000080)={"9a18670ed269d2a93cdf88bab50200", 0x0, r11, {0x8000}, {0xfffffffffffffff8, 0x2}, 0xff, [0x7, 0x10000, 0xc1, 0x800, 0x0, 0x4, 0x1000, 0x8, 0x8, 0x102000000000000, 0x4, 0x2, 0x1f, 0x42b8000000, 0x7f, 0x10000001]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f00000002c0)={{r2}, r11, 0x0, @inherit={0x78, &(0x7f0000001300)={0x1, 0x6, 0x6, 0x2, {0x18, 0x10000, 0x1fc9, 0x6}, [0x2, 0xfffffffffffffff9, 0x3, 0x43, 0x1f, 0xfffffffffffffc56]}}, @name="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"}) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r14}, {r13}, {}, {r13}, {}, {}, {0x0, r14}, {}, {0x0, r14}, {}, {}, {}, {0x0, r14}, {}, {r13}, {}, {}, {}, {}, {}, {r13}, {0x0, r14}, {0x0, r14}, {r13}, {0x0, r14}, {r12}, {}, {r12}, {0x0, r14}, {}, {}, {r12, r14}, {}, {}, {0x0, r14}, {r13, r14}, {}, {r12, r14}, {}, {0x0, r14}, {r13}, {}, {}, {}, {0x0, r14}, {r13}, {}, {}, {0x0, r20}, {r19, r14}, {}, {}, {}, {r12}, {}, {}, {}, {}, {0x0, r21}, {r22, r14}, {0x0, r14}, {0x0, r14}, {}, {}, {0x0, r14}, {}, {r12, r14}, {}, {}, {}, {}, {0x0, r14}, {}, {r13}, {r12}, {r23}, {r13}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {0x0, r14}, {r12, r14}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {r13}, {r12, r14}, {}, {}, {r13}, {}, {0x0, r14}, {}, {}, {}, {}, {r12}, {}, {0x0, r14}, {r12, r14}, {0x0, r14}, {r13, r14}, {}, {r17}, {}, {r12}, {}, {0x0, r14}, {}, {r12}, {0x0, r14}, {}, {}, {0x0, r14}, {0x0, r14}, {0x0, r14}, {r13, r14}, {}, {0x0, r14}, {}, {}, {}, {r12}, {r13, r14}, {0x0, r14}, {}, {}, {r13}, {r19}, {0x0, r14}, {}, {}, {r13}, {r12}, {0x0, r14}, {}, {}, {0x0, r14}, {}, {}, {r13}, {0x0, r14}, {r13}, {}, {}, {}, {}, {}, {r12, r14}, {r13, r14}, {}, {0x0, r14}, {}, {r13}, {0x0, r14}, {}, {}, {}, {}, {}, {0x0, r14}, {r13}, {0x0, r14}, {}, {}, {}, {0x0, r14}, {}, {0x0, r14}, {r12}, {0x0, r15}, {}, {0x0, r16}, {}, {}, {r13}, {r12}, {}, {}, {}, {0x0, r18}, {0x0, r14}, {}, {0x0, r14}, {}, {}, {r13}, {0x0, r14}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {r12}, {}, {r13}, {}, {}, {r13}, {0x0, r14}, {}, {r12, r14}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {r12, r14}, {}, {}, {r13}, {r12, r14}, {}, {}, {}, {r13}, {r13}, {r12}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {r12}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000002c0)={r14, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055100)={0x526, [{0x0, r5}, {r3, r10}, {}, {}, {r9, r5}, {r4}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {0x0, r5}, {}, {r9}, {r4}, {r4}, {}, {0x0, r10}, {}, {}, {0x0, r5}, {}, {0x0, r10}, {r4}, {r8, r10}, {0x0, r5}, {}, {}, {}, {r8}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {r8}, {r9, r5}, {0x0, r5}, {r3, r10}, {r3}, {r3, r5}, {r4, r10}, {0x0, r5}, {0x0, r10}, {r8}, {0x0, r5}, {r8, r10}, {}, {}, {r8}, {r8}, {}, {0x0, r10}, {r3}, {}, {r8, r5}, {0x0, r10}, {}, {r4, r5}, {r3}, {0x0, r10}, {r8, r5}, {r9}, {}, {0x0, r5}, {0x0, r10}, {r4, r5}, {r4}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {r4}, {}, {}, {r4}, {}, {0x0, r5}, {}, {r4}, {0x0, r5}, {r8, r10}, {}, {r4}, {}, {r3}, {}, {0x0, r10}, {r3, r5}, {0x0, r10}, {r8}, {0x0, r5}, {r9}, {}, {0x0, r10}, {r4, r5}, {}, {0x0, r5}, {0x0, r10}, {}, {}, {r8, r10}, {}, {r4}, {}, {r9}, {0x0, r5}, {0x0, r5}, {r9}, {r3}, {}, {r3}, {}, {r8}, {r3, r10}, {}, {r4}, {0x0, r5}, {r4, r5}, {}, {r8, r5}, {}, {0x0, r5}, {r3}, {r3, r10}, {0x0, r10}, {0x0, r5}, {r4}, {r4}, {r3, r5}, {r4}, {}, {r8}, {}, {r4}, {}, {r4, r5}, {0x0, r5}, {r3, r10}, {r9, r10}, {}, {0x0, r5}, {}, {r3}, {}, {r4, r5}, {0x0, r5}, {0x0, r10}, {}, {r8}, {r4}, {0x0, r5}, {r4}, {r3, r10}, {r9, r5}, {r3}, {}, {0x0, r5}, {0x0, r5}, {r8, r5}, {r8}, {}, {r4}, {}, {0x0, r10}, {0x0, r5}, {0x0, r5}, {r4}, {}, {}, {r8}, {0x0, r5}, {r3, r5}, {r4}, {r8, r5}, {r8}, {r4, r5}, {}, {}, {}, {}, {r9, r5}, {r4}, {r4, r5}, {r3}, {r9, r5}, {0x0, r10}, {}, {}, {r4}, {r9}, {r3, r10}, {0x0, r10}, {}, {r9, r5}, {r4}, {0x0, r10}, {}, {0x0, r10}, {}, {r4}, {0x0, r5}, {0x0, r10}, {r4}, {r3}, {r4}, {0x0, r10}, {r8, r5}, {r9}, {0x0, r10}, {r9}, {}, {}, {0x0, r10}, {r9}, {r3, r10}, {0x0, r10}, {}, {r8}, {r3, r5}, {r3}, {}, {r9}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r4}, {r3}, {}, {}, {r8, r5}, {r4}, {0x0, r5}, {}, {0x0, r10}, {r9, r10}, {0x0, r10}, {r9}, {r3}, {}, {}, {}, {r3}, {r9}, {r4}, {}, {0x0, r10}, {r8, r10}, {r4, r10}, {r9}, {0x0, r14}, {r4, r5}], 0x4, "bcb5a55f0b50e4"}) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x22180000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x300}, 0x0) 00:42:50 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x25000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xec0}, 0x0) 00:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x64000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 825.446151][T12221] loop1: detected capacity change from 0 to 7 00:42:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xd6ae8e1651958bef, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x30180000, 0x603}], 0x0, &(0x7f0000000000)) [ 825.491332][T12221] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 00:42:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x27, "9682716138d744d0b48dfe62adfd121a09784f59b0836ec9d6bb53f39132bb9a0406586901084e"}, &(0x7f00000000c0)=0x2f) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x34180000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xf15, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7379735f696d6d757461626ccd2c6673636f6e746578743d733e0c4e80e016e77db1575f752200", @ANYRES16=r0, @ANYBLOB]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f6, 0x200, 0x70bd28, 0x25dfdbfe, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3f000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'batadv0\x00'}, 0x18) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'erspan0\x00', 0x2}, 0x18) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:51 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x40000000, 0x603}], 0x0, &(0x7f0000000000)) [ 826.341671][T12752] loop1: detected capacity change from 0 to 7 [ 826.380456][T12752] FAT-fs (loop1): Unrecognized mount option "sys_immutablÍ" or missing value 00:42:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x4b4b}, 0x0) 00:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x66000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xffff0001, 0x59a, 0x40, 0x58, 0x10, 0x6cd0, 0xe8}, &(0x7f0000000240)=0x9c) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) listen(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fsmount(0xffffffffffffffff, 0x1, 0x1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000140)) sendto$inet(r4, &(0x7f00000000c0)="d223fb121f4c17b5601b0bed9e07bb77f5fcd4c04397957225ef0c75e81260e9c495d1b686644264aadf4aee227eeaed01c4181de88c1e9ebadf8349e76a06cf7937b63e66", 0x45, 0x1, &(0x7f0000000040)={0x2, 0x400, @private=0xa010100}, 0x10) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=@bridge_newvlan={0x3c, 0x70, 0x4, 0x70bd27, 0x25dfdbff, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x2a, 0x3}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x9}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x40) 00:42:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:52 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x40000800, 0x603}], 0x0, &(0x7f0000000000)) 00:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x67000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 00:42:52 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x41020000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="39f628e28e1d9ad7bb32656fc24bcf18928d6b83e68d04cbce3eefc5f1a9d27f3600311e215cabde68988a6a0983222b10b123e486ed741be50db2d772fa94cd33709549bec5773677be3f4c642865496afe82a25ced28b908a704a7ee3b860d5df7cd9d7989cf061fca4e0e8e7e18bf2f15cab013fb4d8d7b6bcf166a45f81970be5782c967eb8a", 0x88, 0x406c, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = signalfd(r0, &(0x7f0000000240)={[0x7]}, 0x8) r3 = dup2(r1, r2) r4 = socket$inet(0x2, 0xa, 0x3) sendto$inet(r4, &(0x7f0000000280)="67f030dcc29d31ebbc4bd3d08e9aa854675e7b4c2faea2282d92d6227e50eb32c16a51275296d41c0a8dc4239ad5ee6946e3683592516a38a5ab7c6617ba20f019e010f4ba66f281556a22517d564a659c10a33c5c4d8114e9efaf5a30815d4609320e1813f7b8ceb610be74cfb78580feab09f35ac553f03ab56576faa4afe6fadddaeb0b41b76540b38ec7c704a0fc12ce9b4d8e41b78a7be17da76e77454435c609e67f837c1d9cfa59d7628385bf991feafc07f42e7985ab2d7dbce5161e64275a37cf6dd7c90f126cb458c4f77cb2a876ccb068c3776c20fecdc195143e833ac233", 0xe4, 0x48000, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000200)=0xffffff87, 0x4) setsockopt$sock_int(r3, 0x1, 0x27, &(0x7f00000001c0)=0xe4, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @multicast2}, 0x10) [ 827.220676][ T24] audit: type=1400 audit(1639096972.705:1634): avc: denied { listen } for pid=13172 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) 00:42:52 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x42020000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:52 executing program 3: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'wg1\x00'}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000002c0)="793dd29af5b99abfdc63cc75f649c16f3bdbd4fb7bc977687a8d6ff54a7d9d9be276cdef4c5a9c86f7f7f681562fec67460a6bb0b7e684240127f294b9a9f69588a4e6e0b984b736cccf56675a9d20b68fcf6a240ff4d59edd0fac88c9c8f9b0fa9111fa6c8b6dfeeeba74c3ed4041eaaf6452f86f615744b238a2a046f71a74eef0a50f7f139f53789779a3ff76a9652b944321b3604a8aa92cc941dfcaaca930a375b673c275", 0xa7}, {&(0x7f0000000380)="6242e5be86aea7f0fd7aefa26fd15d34bb93b33c68e1eca46f419b512c30e3883ca7eceae5f94b0e0faec757a83daa1dd51fac50e1430bf699689ba72626f40d266009d25e8c3c05e17a678d8aaa541d60a426021bc5384679a12488af78ee12ee0ad6ef2ceda15718bda5367000ff8ff1943dfaeabe810a76218abd8002e35c0b1664c1c3e1d0a880b36ed0d7ba23f251cee3dab4ac0165f468b8ac14fdaaac5570519fbf14f9afff1eb0275b8146df3c0abf1f949d69384637d577b74d0afd0d79495fdc37333554441b08078d2acf4d1e686e17eb1b7ead", 0xd9}, {&(0x7f0000000480)="5afaff6b7961163b8983279632495430259bf71876c61af5d1a5dc9498b1ceb6b2918645c15bf36ef2bdef203ce72b86ff35903e276bcad3d1bdb182eddc0dc51fd2f13390bfa61203ff1db2bdd8a84cc4f313669c51976dae890c90ffd2c7664488331b6e05240119263d743aad3a40b36cb1157594fa85b8e4388fa1ed141ce031a1", 0x83}, {&(0x7f0000000540)="1e9da8dccc444e7a621cc68c382fe71ecfde215aec5b640872628c22b3cdbfeb2c1b69d0b3ad49d0c69bc89e78e9355b16a9f596b532fd16854b6de45c53489c6428144f1bae2fb8c3405f71863d889fed59463952cb49f4d74ae737e413553254818ecf783d34c1004cdf32db79f357f7e7fabfae0125a19eb78eff852151a44d54d55ef5872f659246a85c22f100320a0cd011280e77ebcd0c67f26b4d80d0633aac617447b8a8a6a45490a132cd8b23ec1fed4f001ba8739984eef0040114ac0cbe8122037a", 0xc7}], 0x4}, 0x20000004) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x1406, 0x10, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x3f) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:53 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x47020000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 00:42:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x69000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0xffffffc1, {{0x2, 0x4e20, @remote}}, 0x0, 0x7, [{{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}, {{0x2, 0x4e20, @private=0xa010101}}, {{0x2, 0x4e24, @rand_addr=0x64010100}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e21, @private=0xa010101}}]}, 0x410) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_io_uring_setup(0x2e52, &(0x7f0000000500)={0x0, 0x226e, 0x0, 0x3, 0xd1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000640)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x23456}, 0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r5, 0xc0109428, &(0x7f0000001700)={0x2, 0x400}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$can_raw(0x1d, 0x3, 0x1) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000019680)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r7, 0xc0c89425, &(0x7f0000000080)={"9a18800ed269e7a93cfb42df88bab502", 0x0, r9, {0x8000}, {0xfffffffffffffff8, 0x2}, 0xff, [0x7, 0x0, 0xc1, 0x800, 0x1, 0x2, 0x1000, 0x8, 0x8, 0x102000000000000, 0x4, 0x2, 0x1f, 0x42b8000000, 0x31f0, 0x1]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000700)={{r6}, r9, 0x4, @inherit={0x80, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000000000000070000000000000000000000000000004000000000000000430000000000000000000000000000000600000000000000001000000000000000080000000000000000000000000000000001000000000003001409971854b931dbc9000000000000050000000000000000c0ffffff1f0000730c0000000000"]}, @subvolid=0x1}) 00:42:53 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x48000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:53 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 00:42:53 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4c000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x60000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYRES32], 0x1c}}, 0x4048000) setsockopt$sock_int(r1, 0x1, 0x1, &(0x7f0000000080)=0x9db, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) setsockopt$sock_int(r3, 0x1, 0x13, &(0x7f0000016ffc)=0xfffffff9, 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) kcmp(0xffffffffffffffff, r5, 0x3, r6, r4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r7, 0x400, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040100}, 0x4040001) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 00:42:54 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x68000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000e3826c0f8d23656d26f0000000000000000000000000000000000000000000000000040000000000000000000000000380000000000000000000000000000000000000000ffffffffffffffe500000000000000004000000000000000f0001900000000000000000000000000000000ee007ebf1c97eac6e17d195245039eb2d7bf73e6fea0943480fe1b000000000000000000"], 0x91) connect$phonet_pipe(r1, &(0x7f0000000040)={0x23, 0x7f, 0x6d, 0x7}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) accept4$inet(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x800) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000000c0)) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f0000000180)=0x7ff, 0x4) listen(r0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e24, @private=0xa010102}, 0x10) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 00:42:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000000c0)={0x1f, {{0x2, 0x4e22, @multicast1}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) 00:42:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6c000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 00:42:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x74000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @private=0xa010102}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x3fe, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x83, &(0x7f0000000040)=@assoc_value={r5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000003e80)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000003f40)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000003f80)={0x0}, &(0x7f0000003fc0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f00000040c0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e23, 0x0, @mcast1, 0x10001}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="7cc1aa598040ae1b7bbda22765aef53dd5b76f4366b79e1e754d92780d00ad175e322e5f53edbf4677f3da3dee3030f07e443b198f7f7b7d0a88d44ca6c25e276633afa28ac9abe4a975cc3dd2dbe7f1545aaf0df85816882740938822b104d71825c1fe804797bd5ab99bfdaaa5189da2f7130d0723c0cb2ab179bbb0d545ed98bb418aeef731e1b982d85d9708963ead8d1263f64d789b61d456", 0x9b}, {&(0x7f00000011c0)="e861968d705e3cac3f939d6c4935b875087b9eeb", 0x14}, {&(0x7f0000001200)="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", 0x1000}], 0x4, &(0x7f0000002240)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x4}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x3}}, @sndrcv={0x30, 0x84, 0x1, {0x79d9, 0x20, 0x8200, 0x1, 0x10001, 0x5, 0x81, 0x5, r5}}, @init={0x18, 0x84, 0x0, {0x7, 0x56, 0x0, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @init={0x18, 0x84, 0x0, {0x50, 0x7, 0x7f, 0x7f}}, @authinfo={0x18, 0x84, 0x6, {0x8}}], 0xd8, 0x40}, {&(0x7f0000002340)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002380)="c59c87c4a2fae58454614ba2d18abad7efb2440bb10f6e0c86238c5b99257edd7d432d3b80c65de7f46bf9b50057bf57dc232f940a2a948155568053290bffc9dc83cba27f8607e4a36c3b934653d58838fd85", 0x53}, {&(0x7f0000002400)="be9ab89c3458914e5d5dc411e769bf3932dbca47d7ee9cab378fa9bf3fd0d165cfb3eedbd86aa5922743c77dd9bd2ffa9901e58abc9b11b947d6fc0a767eca20f646041374d52c58e17815e583467178c0541ab579d3efd7973b7a94b5b7ec1c995dca65659572df2450c6f0d4bcf89ecdba985e35e66c01c83553c7798d53adeb5a40749adc8c211f94c8b91e984b001a2b4c58ffd29015898c0a64bd5e99f6", 0xa0}, {&(0x7f00000024c0)="47ff775d3aabf23fe67cd822bc412fa4abc62566d3289499a02253271690a75c04b20f39bde49a43580b7b92ce9b7418d2f934b0791fa04ce9759232ef1fe78c5e7effb0799047dd38c6092522d1182ea4f5768bba99d5569eb2c4edb01d159f1969531a89d4ece78934d90c0a9de7862447d8490d1797784686bd448a332f87ce9b5348b3f81f7c7d694c72e0945f484b2a5ff3309019b8a4271675584c164bca4e68320afa82b06c719860a407adec4f9c3a61cbb5d3", 0xb7}, {&(0x7f0000002580)="e710c177aaff691e278ae38a23f550fe32a54603eca3dcca13b0521c29cfcd3f5cfeeed89e6eb371c9a7e2efb0dcc4adf2cad82e33233d5e446ace9f7892c6b9a575a1f8d09afefcdbe9b02f60e408a4b5e2ab32b73b8aca58deaf8ff512a50e062df9153b866eef4fbad057f989ebb27b686db35559cbcd00191a18c18d780244b750ec9e2c8fb312751cf5a23a3914eb33", 0x92}, {&(0x7f0000002640)="a230953630c666bf4df88a3bf3ab9b561862c6fb58ca0d5e71dd6255bed2347177ebbb3bded460c49e2b95e6e87b17230a127fe0fec7eb95dba6820684a171289b80849caa070bd442ac1274770661e9b6c99e536af3f96c9c8446a79d7d3cf082875d95bc0892327f36037e391f3ebf4920a72e89be287ae4346f5120", 0x7d}, {&(0x7f00000026c0)="f2d657bbd2c17333e23421d09774faf2c87b466fa6d795e4a6a98b6f5698efbe282b4e8382efb9ebba52437813c11e334697128b9c4c46b45e160d2b1e36f5138513", 0x42}, {&(0x7f0000002740)="80ebaaf49abf90d17c09fc1ca11f3d38030056e6e66107a4fab3ad99bc555c508205abc00378062953c7f4caf4a85a2138afe07bac114d45d17c38f62c624428ffa8ff06f798ade1ca5886c5a2a7f370dcb9a6a6cad0adf834db3f02df872dcf805fa7ff93318a6c4f7a907629faf4f8c26ea41da9a728b484ef30f50447305a1d68387f5038b4f6a488fe86198034163b4fe80d09b53896491f908dac3f2a0e03c8500a4f483357ba92dc09ecdb771f91f4", 0xb2}, {&(0x7f0000002800)="101089d606c5e391f9f03ba156a1c06af2b3db547224118e29a06fcbe1f0b14c8193b02bd4423df2da39a036f14e88cec001c7a3ae3b887793818d7d716a582beba31c1a6e0b82e3d17456521f94bbf0fd1eed95e1f47ca43b5cce3da4e1fbf3cc65d7d568acd8e6b5d08f552ccf24264260f57d9921600a85fc3f3f33e2706ef643de5787eb3128391328c0b142a7345286ef3da21637f2074cf558608d07aaac7a591382941090fb85a300d1cb4bb5d0fda6", 0xb3}, {&(0x7f00000028c0)="aef12e42fd2779e992b10e99f71fa5d45c4329140f1184fc1d1fed5e79a1221cc0a917bc4d4fbfa271943c6c48c5212b2e1c4fb1fb7cfb9ce09744a8e4319f38f254a797f51c62392e6da407068c2b0ac7c527b94c7f5692a55299f98ba1f910d8", 0x61}, {&(0x7f0000002940)="b826373147437177554d7d0da5952ad4a77aa0249cc4c0f89a11158a0bdc45452d9aa28dd2ce755d7e049331c2e60c508920b0f0a05caa24c35bdab82c29115b327fcc04c92a411d608ad8d4cbd4600e1e417186151cc364d9d1c730281e565ba82439d379af9598f8e43cc24caf8d08ebf82bed35b3e60a04fd8acd8244b4d65f6f750f58b46070bce551282a09ddbacde0025528c73b7ef763109e3530cd3388a357b8b1adbc75f859ba091d034d7fc503d23aed0bb737edbf136fc8059d4b4cbef100a82e6d322ff5da184822ed3fbcf54fc69909411d37a04be7cdd50fc08db423a266b1453cddbf71a1177981771854c362cd5ff8", 0xf7}], 0xa, 0x0, 0x0, 0x4000000}, {&(0x7f0000002b00)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002cc0)=[{&(0x7f0000002b40)="7ff7681bde4b032725ca4010f663ad2d51fc5642baa1a3364b065449f5eaaddc1b02cd1811e09c1e9d5e2be17d9a6ca3b06c34fac920bd49251a4dfc89208d6fbbde1d72d3aee962f474cfd9ff3122d297b0738fae1305220258f6919973c1a239b15d3ca720c539e0311b855d6284192057032472080db154b80b287f03300055d2", 0x82}, {&(0x7f0000002c00)="dacecd6565acf771c1fd48f42d12545f0fe985ea005c89b5737bdef30db1f2927b1b14a3008cbef8e643a8e34e968f74aa45970219c60cfe019835fbb55c70d20c110b4f6fe2971c83577046849b31b9355c77c95bb2c15f7f6f5736afeb494e211f9346bc7f9e913e5613dcf8ef30fb547ae55dd6c93100b742922aabf4ef9f9791982cdce11dd4c2d04abfec3f2d3d097a1f77d6c5bd0c93444471fae1", 0x9e}], 0x2, 0x0, 0x0, 0x10}, {&(0x7f0000002d00)=@in6={0xa, 0x4e20, 0xba, @mcast2, 0x6}, 0x1c, &(0x7f0000003e40)=[{&(0x7f0000002d40)="daf821bc1cd27433bb68d0e133346befe1547f8cc81c4a7923cee692904a84a5391fe2684786913427459017972f62cfd9e2ab4531ba3b364d03e0c4451a5efe2a3537c2afeb8af583cc5b417333d7df72a5a32d7484ed68f7d71a0b5806e31c903708dc45a881c289ec2a748c06962f54c8cba2acec85eae61bf68fee52931a422d894cd87935820e594c956c7242c2fa361ae90a3cc39971ab1eabc57bfe42586a8c44fde4551817311d14aba74504573f23e0c5818271cc2b61cb13e6ae446b1d8083a8238723016070ff5ddbeac9b8e0b4866b98d76c9a5cda8cdd23e07924d7502e38647ae0aef9f589aed8a0f9830a0d79", 0xf4}, {&(0x7f0000002e40)="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", 0x1000}], 0x2, &(0x7f0000004000)=[@authinfo={0x18, 0x84, 0x6, {0x9}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x6, 0x4, 0x0, 0x7, 0x3, 0x20, 0x7d08}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x28}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8000, 0x3, 0x200, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0xa, 0x5, 0x8, r7}}], 0xa8, 0x40004}], 0x4, 0x24000000) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:55 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x78000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7a000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) 00:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x81000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @remote}, 0x10) 00:42:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:56 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x85ffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:42:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 00:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f00000000c0)="70579cf8d1fcc85497067ebefd622030c386f0860475c8f45ce8f9669d2a0cab622dbc7fea7bc43ee79d76de2cdc9d377431f4780e6ba522a4533c321605281f7e2217d9e5e26f8a40cb432ca96cfc05d060660fec2ca44a0c06d0d28e70e2ffe70990c9472d5b103364112c35e9767cfb7377310cf28cba7b575dfe3bdc3034aefcf56e9d01e2dceb940840f2772aab7662ac2931d169b10da6ce4016fab5c1318ed7a91875", 0xa6, 0x20000000, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r4 = accept4(r0, &(0x7f0000000200)=@phonet, &(0x7f0000000280)=0x80, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r3, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) syz_open_dev$sg(&(0x7f0000000040), 0x8, 0x642202) 00:42:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x89000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x4b4b0000}, 0x0) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8cffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:42:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x9d050000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x7fff}], 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x64010102}, 0x10) recvmmsg(r1, &(0x7f0000003000)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/179, 0xb3}, {&(0x7f0000000200)=""/76, 0x4c}, {&(0x7f0000000280)=""/103, 0x67}, {&(0x7f0000000300)=""/182, 0xb6}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f0000000400)=""/28, 0x1c}], 0x6, &(0x7f00000004c0)=""/4096, 0x1000}, 0x8000}, {{&(0x7f00000014c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001540)=""/215, 0xd7}], 0x1}, 0x2}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001680)=""/111, 0x6f}, {&(0x7f0000001700)=""/100, 0x64}], 0x2, &(0x7f00000017c0)=""/182, 0xb6}, 0x2}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000001880)=""/236, 0xec}, {&(0x7f0000001980)=""/14, 0xe}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/143, 0x8f}], 0x4, &(0x7f0000002ac0)=""/113, 0x71}, 0x200}, {{&(0x7f0000002b40)=@ieee802154, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002bc0)=""/167, 0xa7}, {&(0x7f0000002c80)=""/91, 0x5b}, {&(0x7f0000002d00)=""/107, 0x6b}, {&(0x7f0000002d80)=""/76, 0x4c}, {&(0x7f0000002e00)=""/10, 0xa}, {&(0x7f0000002e40)=""/206, 0xce}], 0x6, &(0x7f0000002fc0)=""/9, 0x9}}], 0x5, 0x2, &(0x7f0000003140)={0x0, 0x989680}) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb8010000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x72000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0xa0000, 0x0) sendto$inet(r2, &(0x7f00000000c0)="05301c95539e83f3efcf47441d459408cb806a05230adc3b4c0e7e869178d9b4b8349f0c7bd4559c75db6eb3f6b854f9edb4e7aa3179431a8ca48c070de76c209439b126", 0x44, 0x1, &(0x7f0000000140)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) listen(r0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x27, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xbd010000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:57 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xbe010000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 00:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc0ed0000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) 00:42:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x10000}}, './file0\x00'}) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000019680)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000080)={"9a18800ed269e7a93cfb42df88bab502", 0x0, r5, {0x8000}, {0xfffffffffffffff8, 0x2}, 0xff, [0x7, 0x0, 0xc1, 0x800, 0x1, 0x2, 0x1000, 0x8, 0x8, 0x102000000000000, 0x4, 0x2, 0x1f, 0x42b8000000, 0x31f0, 0x1]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000180)={{r1}, r5, 0x10, @inherit={0x88, &(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000800000000000000010000000000000008000000000000002a000000000000000300000000000000de00000000000000ffff00000000000044cf00000000000008000000000000000000010000000000477a0000000000008a549303de3e0d5affffffffffffffff0200000000000000080000000000000000000100000000000700000000000000"]}, @subvolid=0x3}) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x9, 0x3, 0x278, 0x128, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x2}}, @inet=@rpfilter={{0x28}, {0xd}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x8, 0x9, 0x9, 0x9, 'syz1\x00', 'syz0\x00'}}}, {{@ip={@remote, @empty, 0xffffff00, 0xffffff00, 'vxcan1\x00', 'macvlan0\x00', {}, {}, 0x2f, 0x3, 0x23}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xa}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0xfffffffd) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000400)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 00:42:58 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc3050000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 00:42:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x75000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 833.393739][T16283] x_tables: duplicate underflow at hook 3 [ 833.429881][T16413] x_tables: duplicate underflow at hook 3 00:42:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:42:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc8110000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 00:42:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000000c0)=0x6, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x76000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd8000000, 0x603}], 0x0, &(0x7f0000000000)) 00:42:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:42:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 00:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x77000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:42:59 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xdaffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:42:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 00:43:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xdf000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe0000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 00:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x79000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe1000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:00 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf6ffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xffffffea}, 0x0) 00:43:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf9fdffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x13) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000001800)={'batadv0\x00', 0x0}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c00000007060101230564acab965511000000000500010006000000"], 0x1c}}, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000019680)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f0000000080)={"9a18800ed269e7a93cfb42df88bab502", 0x0, r7, {0x8000}, {0xfffffffffffffff8, 0x2}, 0xff, [0x7, 0x0, 0xc1, 0x800, 0x1, 0x2, 0x1000, 0x8, 0x8, 0x102000000000000, 0x4, 0x2, 0x1f, 0x42b8000000, 0x31f0, 0x1]}) ioctl$BTRFS_IOC_RM_DEV_V2(r4, 0x5000943a, &(0x7f0000000400)={{r0}, r7, 0x1e, @unused=[0x8, 0x1, 0xac, 0xe8b], @name="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"}) bind$packet(r2, &(0x7f0000001840)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@deltclass={0x4c, 0x29, 0x1, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x7, 0xe}, {0xfff1, 0x10}, {0xa, 0x5}}, [@tclass_kind_options=@c_netem={0xa}, @TCA_RATE={0x6, 0x5, {0x8, 0xc8}}, @tclass_kind_options=@c_prio={0x9}, @TCA_RATE={0x6, 0x5, {0x5, 0x59}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r8, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfb110000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 00:43:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfdfdffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"e42e1aa19152c39849532a3d8687d3cf", 0x0, 0x0, {0x7, 0x4}, {0x1, 0x2}, 0x4, [0x9, 0x25, 0x2, 0x200, 0x6, 0x1f, 0x5, 0x3, 0x10001, 0x6, 0x10000, 0x1, 0x3f, 0xfffffffffffffffe, 0x430d, 0x7f65]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000240)={{r0}, r1, 0x4, @inherit={0x78, &(0x7f00000001c0)={0x0, 0x6, 0x3f, 0xfffffffffffffffb, {0x0, 0x12, 0x0, 0x5, 0x9ad}, [0x8, 0x7f, 0x8f3, 0x9, 0x1, 0xfffffffffffffffb]}}, @name="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"}) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000001240)="abfa9bbea8bbebca3cbf6d61982f7d110bae3df798372966c933b307772399e50f03c203b7e91a015176bf69a5ac9d48c8d13aae8fa04d2714d7b98384f959f16e01e0dfe5c22db387652f6f61c2712282a5c10e45cdfbaa85d017223c6d8571af234ca99b7de7ab33c49b95f5359c27f05c092cff2d81690de4e9d8af0ae59aa7b620de0f1789ec047322b72853c0ca03bd8fc17528e7f6f0a700a7c83ab9332c5e2f8da7db48f668aef1dab94151f549dff7ea22982a82b7ad64d1b6993c73ce5d0a6ecf8f22789ca76f81f556ed0cea569b05f933bdc60fb1caec991ba3d75093d248b214c4eaca1ae234", 0xec) 00:43:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfeffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x7ffffdbf}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 00:43:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xff0f0000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffdffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x34, 0x0, 0x0, 0x1}, {0x6}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/201, 0xc9}, {&(0x7f0000000040)=""/13, 0xd}, {&(0x7f0000000240)=""/72, 0x48}, {&(0x7f00000002c0)=""/48, 0x30}], 0x4, &(0x7f0000000340)=""/52, 0x34}, 0x10101) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000003c0), &(0x7f0000000400)=0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 00:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffffdf9, 0x603}], 0x0, &(0x7f0000000000)) [ 836.969430][ T24] audit: type=1326 audit(1639096982.455:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18048 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffffdfd, 0x603}], 0x0, &(0x7f0000000000)) 00:43:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/xusbatm', 0x1, 0x28) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) 00:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x2) 00:43:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffffdff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @private}, &(0x7f00000000c0)=0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns\x00') recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/222, 0xde}, {&(0x7f0000000240)=""/29, 0x1d}], 0x2, &(0x7f00000002c0)=""/190, 0xbe}, 0x10040) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {0x6}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xffffff7f, 0x603}], 0x0, &(0x7f0000000000)) 00:43:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x3) 00:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:03 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xffffff85, 0x603}], 0x0, &(0x7f0000000000)) [ 837.810955][ T24] audit: type=1326 audit(1639096983.295:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18448 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xffffff8c, 0x603}], 0x0, &(0x7f0000000000)) 00:43:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x4) 00:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xffffffda, 0x603}], 0x0, &(0x7f0000000000)) 00:43:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x426800, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r3, 0xf502, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x40, 0x2, 0x1}}, @qipcrtr={0x2a, 0x4, 0x2}, @l2={0x1f, 0x400, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x1d6b, 0x2}, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x55e0, 0x5, 0x8}) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000200)=0x1, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00', 0x0, [0x1f, 0x51, 0xfffffff7, 0x566, 0x5]}, &(0x7f0000000040)=0x54) 00:43:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x8) 00:43:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffffff6, 0x603}], 0x0, &(0x7f0000000000)) 00:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x82000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x5}, {}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x83000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xfffffffe, 0x603}], 0x0, &(0x7f0000000000)) 00:43:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xf) 00:43:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c460000000000000000f2e6d831c0ef94d300000000000000000000000000000010000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000"], 0x78) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f00000000c0)={'ip_vti0\x00', 0x10001, 0x2}) listen(r0, 0x5) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 839.516878][ T24] audit: type=1326 audit(1639096984.995:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x84000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x60) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x8000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460009000000000000000000ccb541f3d1013759000000000000000000400000000000000000000000000000000000000000003800000002000000000000000000000000000000000000000000000000000000000000000000e6ff00000000000000000000000000040000000000000000000000002a19fd10e402ec8d3f7f44ec59e888436b988e7c8f837bfda4239abd91ecca348bf73e422eeb69a0aee39319d1239d55b7a17028c703a2e05bf523d4b5d94abaf4d7faf577b04e2b879a4c91ed0f8bfaf6338c22e6a4616f161d6929a500000000000000"], 0x78) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r4 = pidfd_getfd(r2, r3, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r5, 0x0) sendto$inet(r5, &(0x7f00000000c0)="c26f8a277ad97ee8c072fa26f5f1698ff4f98aded11b9017b390e0adf1cb448ac2c1813c5600b7a34c26c834dbb5fa05a78576a45e1407b00fe7b81316f65abc9b51d4d6a1e8ff3664461e83ed98e3", 0x4f, 0x8, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_buf(r4, 0x0, 0x25, &(0x7f00000003c0)="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", 0xff) 00:43:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x80000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e1f, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000001700), 0xff, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f00000001c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0x40, 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000000c0)) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$rds(r3, &(0x7f00000016c0)={&(0x7f0000000200)={0x2, 0x4e23, @private=0xa010102}, 0x10, &(0x7f0000001300)=[{&(0x7f0000000240)=""/177, 0xb1}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x2, &(0x7f0000001540)=[@mask_fadd={0x58, 0x114, 0x8, {{0x4, 0x3}, &(0x7f0000001340)=0x6, &(0x7f0000001380)=0x1, 0xfff, 0x4, 0x7, 0x7efd, 0x8, 0x10001}}, @fadd={0x58, 0x114, 0x6, {{0x7fffffff}, &(0x7f00000013c0)=0x9, &(0x7f0000001400)=0x7, 0x100000000, 0x8, 0x0, 0x2, 0x4c, 0x5}}, @mask_cswp={0x58, 0x114, 0x9, {{0x4}, &(0x7f0000001440)=0x22bc, &(0x7f0000001480)=0x3, 0xcd, 0x80000001, 0x200, 0x4, 0x0, 0xffffffff}}, @mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x7fffffff}, &(0x7f00000014c0), &(0x7f0000001500)=0xffffffff, 0x7, 0xff, 0x4b, 0x7f, 0x2, 0x2}}], 0x160, 0x24044000}, 0x8000) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10) 00:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x300) 00:43:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @rand_addr=0x64010100}, 0x10) 00:43:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xec0) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xedc000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 840.424487][ T24] audit: type=1326 audit(1639096985.905:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19556 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:05 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000040)=0x2, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xf00) 00:43:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x7ffffffffffff, 0x603}], 0x0, &(0x7f0000000000)) 00:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x86000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x20000, 0x0) sendto$inet(r2, &(0x7f00000000c0)="745f475acbd03ebeef6a6f51cec1910f7a30ffd100b2c25c64a88a0245047728d3ecbe27d6ac8cb25efda3d990c6b73cc1041ba1cbf1fd3db065e893d40cd9dbfe1d8ef41f6590eca674367b2c833af21ff6cfea4ceddcc9135204b1a8ef49c55b8a3fd75ca9cb58db3be56115f8b65e29a4e22af3b7eb8f2bee8867d8d86d3182de42d506fa80b3c034418de45fc44418f7e2139b816244bbf399b3c9b15d8632d57e221aab68fd85228746fbb567d036fa4845b23b0543b9e2d9ed23", 0xbd, 0x24040880, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x50, r2, 0x10000000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600e7ffffff0000000000000000040000003a87b1470883f10000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000e6ffffffffffffff00000000000000000000000000de5e4f517a027c1e1f8e307d59eaeeb9450000ff8b00"/134], 0x78) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r5 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r5, 0x10000000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x2, 0x0, {0x0, r8}}, 0x1) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r2, &(0x7f0000000200)={0x10}, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x7fff) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000840)={0x0, 0x0, "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", "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"}) 00:43:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) shutdown(r0, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 841.317108][ T24] audit: type=1400 audit(1639096986.795:1639): avc: denied { map } for pid=19981 comm="syz-executor.3" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 841.340781][ T24] audit: type=1400 audit(1639096986.795:1640): avc: denied { execute } for pid=19981 comm="syz-executor.3" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 00:43:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x83, &(0x7f0000000040)=@assoc_value={r4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r4, &(0x7f00000000c0)=0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000100)='batadv_slave_1\x00') 00:43:06 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x40000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x87000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x4b4b) 00:43:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r2, 0x8, 0x1070bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x14202, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x27, 0x0, "bd1b92792bc4439f7b6e0610ae8177ff9439524076e2c75ae7c22f8ff9d24b9dcb32c5572e9eae0706e292e37f1de7167a911fb491ba5011da24d852ea70f65f230f2fa250a22d84a6dfe761d5830e50"}, 0xd8) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x100000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x10e000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x200000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 842.229734][T20211] ================================================================== [ 842.237838][T20211] BUG: KCSAN: data-race in __ext4_update_other_inode_time / d_instantiate_new [ 842.246691][T20211] [ 842.249011][T20211] write to 0xffff88813520b760 of 8 bytes by task 20208 on cpu 0: [ 842.256722][T20211] d_instantiate_new+0x99/0xe0 [ 842.261485][T20211] ext4_add_nondir+0x172/0x1a0 [ 842.266250][T20211] ext4_symlink+0x4ba/0x700 [ 842.270763][T20211] vfs_symlink+0x241/0x330 [ 842.275181][T20211] do_symlinkat+0x104/0x380 00:43:07 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x204000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x89000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 842.279686][T20211] __x64_sys_symlink+0x52/0x60 [ 842.284447][T20211] do_syscall_64+0x44/0xd0 [ 842.288870][T20211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.294763][T20211] [ 842.297078][T20211] read to 0xffff88813520b760 of 8 bytes by task 20211 on cpu 1: [ 842.304785][T20211] __ext4_update_other_inode_time+0x45/0x550 [ 842.310773][T20211] ext4_mark_iloc_dirty+0x4c6/0x890 [ 842.315979][T20211] __ext4_mark_inode_dirty+0x4ec/0x5f0 [ 842.321441][T20211] ext4_ext_tree_init+0x94/0xa0 [ 842.326294][T20211] __ext4_new_inode+0x29e6/0x2fc0 [ 842.331313][T20211] ext4_symlink+0x2cc/0x700 [ 842.336419][T20211] vfs_symlink+0x241/0x330 [ 842.340829][T20211] do_symlinkat+0x104/0x380 [ 842.345329][T20211] __x64_sys_symlink+0x52/0x60 [ 842.350094][T20211] do_syscall_64+0x44/0xd0 [ 842.354505][T20211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.360574][T20211] [ 842.362884][T20211] value changed: 0x0000000000008008 -> 0x0000000000000000 [ 842.369979][T20211] [ 842.372297][T20211] Reported by Kernel Concurrency Sanitizer on: 00:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 842.378431][T20211] CPU: 1 PID: 20211 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 842.387185][T20211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.397235][T20211] ================================================================== [ 842.421734][ T24] audit: type=1326 audit(1639096987.905:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20211 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x219000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e32, @rand_addr=0x64010100}, 0x10) 00:43:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x6000) 00:43:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x300000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @private=0xa010100}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 00:43:08 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x319000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) 00:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xc00e) [ 843.283776][ T24] audit: type=1326 audit(1639096988.765:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20755 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) 00:43:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x400000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r2, 0x0) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80900, 0x4184cd4407226ddb) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='macvtap0\x00', 0x10) 00:43:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x34000) 00:43:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x500000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) 00:43:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)=@newlink={0x34, 0x10, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r9}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r10, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r10, 0x0) 00:43:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x600000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x400300) 00:43:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) [ 844.140108][T21180] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 844.155336][ T24] audit: type=1326 audit(1639096989.635:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21181 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) 00:43:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = dup2(r0, r1) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 00:43:09 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x604000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 844.193217][T21180] 8021q: adding VLAN 0 to HW filter on device bond1 [ 844.201544][T21180] bond0: (slave bond1): Enslaving as an active interface with an up link [ 844.212310][T21389] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="b05cb34cf56a63489cc372d8e1a159b87f742eb60758aa8563a1de98119f501bcbc2530b640240c21fb5cabef2365cfaefd18e6f593757b2c5ba8fedf44610eacf996feb6d14e7723567c2c8f9fe36f77b0e3f8795d02ef533c5fba096bff51e6bad0a1bfb49969894976345985420669e42324e8f8953f5de0d9ec94ce12df9c486e257cef4aafd67000aa76ee7232c90b89aca99fd7160fc70befd931001b9b5777eb330ac3f114a5e24cd20902acf", 0xb0, 0x800, &(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000070601010000241400000000000000000500010006000000"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000040)={0x0, 'veth0_to_bond\x00', {0x3}, 0x4}) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x1000000) 00:43:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x700000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) 00:43:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x800000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x6, 0x8, 0x4}, 0x40) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), &(0x7f0000000000)=@udp=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="1878be82a6fb73095d957ae84e53a97e000000000033e1fff5000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0xe0745a0828f8a180, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r1, &(0x7f0000000340), &(0x7f0000000440)=@udp=r2}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000480)={r1, &(0x7f0000000340), &(0x7f0000000440)=@udp}, 0x20) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x1}) bind$inet(r4, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x900000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) 00:43:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x2000000) 00:43:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000280)=0x8, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x101200, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2000000, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYBLOB="5a4053d257777cbb25eb83d6114ac8d44120344c65b69e2fafbbc2f02647d726f4f07b9f6c75ba", @ANYBLOB="2c6c6f6f73652c7375626a5f726f6c653d7d2c7365636c6162656c2c636f6e746578743d73797361646d5f752c736d61636b6673726f6f743d2c7375626a5f757365723d2e2b982c657569643c", @ANYRESDEC=r4, @ANYBLOB='(\x00']) 00:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:10 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xa00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, 0x0, 0xa198) 00:43:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x3000000) 00:43:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) setsockopt$sock_int(r1, 0x1, 0x3, &(0x7f0000000080)=0x409004, 0xfffffffffffffef1) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0xe0, 0xe2, 0x7, 0x9, @mcast2, @mcast1, 0x40, 0x7800, 0x9, 0xe66}}) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) (fail_nth: 1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x99000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x4000000) 00:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, 0x0, 0xa198) 00:43:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, &(0x7f0000016ffc)=0xfffffff9, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, 0x0, 0xa198) 00:43:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xb18000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 845.932573][T22326] FAULT_INJECTION: forcing a failure. [ 845.932573][T22326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 845.945675][T22326] CPU: 1 PID: 22326 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 845.954670][T22326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.964738][T22326] Call Trace: [ 845.968023][T22326] [ 845.970947][T22326] dump_stack_lvl+0xd6/0x122 [ 845.975543][T22326] dump_stack+0x11/0x1b [ 845.979700][T22326] should_fail+0x23c/0x250 [ 845.984121][T22326] should_fail_usercopy+0x16/0x20 [ 845.989154][T22326] _copy_from_user+0x1c/0xd0 [ 845.993774][T22326] do_seccomp+0x3af/0x1570 [ 845.998314][T22326] ? debug_smp_processor_id+0x18/0x20 [ 846.003689][T22326] __x64_sys_seccomp+0x3c/0x50 [ 846.008489][T22326] do_syscall_64+0x44/0xd0 [ 846.012902][T22326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 846.018861][T22326] RIP: 0033:0x7f981fed4af9 [ 846.023314][T22326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.043047][T22326] RSP: 002b:00007f981f64b188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 846.051565][T22326] RAX: ffffffffffffffda RBX: 00007f981ffe7f60 RCX: 00007f981fed4af9 [ 846.059532][T22326] RDX: 0000000020000300 RSI: 0000000000000000 RDI: 0000000000000001 [ 846.067871][T22326] RBP: 00007f981f64b1d0 R08: 0000000000000000 R09: 0000000000000000 00:43:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x8000000) 00:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e21, @local}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x1e, &(0x7f0000016ffc)=0x1, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000100)="a64537744ad19c0aa241fd51568f9fb2ffc91e04e487fc2020b466cf387ae064bde503d81a346d94f9606d9428add3ededba45b10957fcde811da4524529ae88a959cc2ef0b9c05f8e54830b9fac08", 0x4f, 0x20040000, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='cubic\x00', 0x6) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'ipvlan1\x00'}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) shutdown(r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 846.075837][T22326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.083803][T22326] R13: 00007fff939f16ef R14: 00007f981f64b300 R15: 0000000000022000 [ 846.091896][T22326] 00:43:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xc00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9b000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0x0) 00:43:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xf000000) 00:43:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xd00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0x0) 00:43:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xe00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x2, 0x0, {0x0, r5}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r0, 0x80, &(0x7f00000000c0)=@rc={0x1f, @any, 0xfb}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x1ff) listen(r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r6 = accept4$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000200)=0x10, 0x80400) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r8 = syz_open_pts(0xffffffffffffffff, 0x200) syz_io_uring_submit(0x0, r4, &(0x7f0000000280)=@IORING_OP_FILES_UPDATE={0x14, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r6, r1, r7, r8], 0x7, 0x0, 0x1, {0x0, r5}}, 0x9) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r9, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @mss], 0x4) 00:43:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x4b4b0000) [ 846.222206][ T24] audit: type=1326 audit(1639096991.705:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22740 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f981fed4af9 code=0x0 00:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0x0) 00:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9d000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0xf00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) sendto$inet(r0, &(0x7f00000000c0)="b680a4cb6f40c071d377bd0211828e063e4337f801e648d62878b8c567240136e03760f2e4238b93803e6656a58f7f08da69bb717230df1134485b0f80edf71edb9f70ed472bd9e6d7bc5a1358e8ba8d6ffabbde96cf643cfd1126de46e423e678e592fa49c524f38d4f41b9d30dc2c5346aea4bfb4cd23b09bb76a91dc8984e", 0x80, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x60000000) 00:43:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) (fail_nth: 1) 00:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x24000, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1, 0x3, 0x5, 0x4, 0x0, 0xcc, 0x879, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x4, 0x7ff, 0x3ff, 0x3, 0x5, 0x4, 0x9, 0x0, 0xb770f31c, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r0, 0x2) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x3, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmmsg$unix(r0, &(0x7f00000026c0)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000002600)=[{0x0}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/60, 0x3c}, {&(0x7f0000001340)=""/245, 0xfffffffffffffe96}, {&(0x7f0000001440)=""/236, 0xec}, {&(0x7f0000002700)=""/4099, 0x1003}, {&(0x7f0000002540)=""/170, 0xaa}], 0x7}}], 0x1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0x26, &(0x7f0000000080)=0x7fff, 0x4) listen(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1000000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 847.093384][T23204] FAULT_INJECTION: forcing a failure. [ 847.093384][T23204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 847.106758][T23204] CPU: 1 PID: 23204 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 847.115711][T23204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.125763][T23204] Call Trace: [ 847.129037][T23204] [ 847.131995][T23204] dump_stack_lvl+0xd6/0x122 [ 847.136597][T23204] dump_stack+0x11/0x1b 00:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 847.140757][T23204] should_fail+0x23c/0x250 [ 847.145220][T23204] should_fail_usercopy+0x16/0x20 [ 847.150276][T23204] _copy_from_user+0x1c/0xd0 [ 847.154867][T23204] __x64_sys_sendfile64+0x87/0x140 [ 847.160237][T23204] do_syscall_64+0x44/0xd0 [ 847.164657][T23204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 847.170624][T23204] RIP: 0033:0x7f9dc1d40af9 00:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa0000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 847.175032][T23204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.194787][T23204] RSP: 002b:00007f9dc14b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 847.203197][T23204] RAX: ffffffffffffffda RBX: 00007f9dc1e53f60 RCX: 00007f9dc1d40af9 [ 847.211164][T23204] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 847.219128][T23204] RBP: 00007f9dc14b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 847.227100][T23204] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000001 [ 847.235064][T23204] R13: 00007ffd546b03bf R14: 00007f9dc14b7300 R15: 0000000000022000 00:43:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1100000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x9effffff) [ 847.243145][T23204] 00:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa1000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1200000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 847.264943][T23542] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:43:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) (fail_nth: 2) 00:43:12 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1518000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa2000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 847.436497][T23878] FAULT_INJECTION: forcing a failure. [ 847.436497][T23878] name failslab, interval 1, probability 0, space 0, times 0 [ 847.449317][T23878] CPU: 0 PID: 23878 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 847.458177][T23878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.468240][T23878] Call Trace: [ 847.471508][T23878] [ 847.474452][T23878] dump_stack_lvl+0xd6/0x122 [ 847.479060][T23878] dump_stack+0x11/0x1b [ 847.483289][T23878] should_fail+0x23c/0x250 [ 847.487700][T23878] ? alloc_pipe_info+0xac/0x350 [ 847.492631][T23878] __should_failslab+0x81/0x90 [ 847.497492][T23878] should_failslab+0x5/0x20 [ 847.502201][T23878] kmem_cache_alloc_trace+0x52/0x350 [ 847.507634][T23878] alloc_pipe_info+0xac/0x350 [ 847.512352][T23878] splice_direct_to_actor+0x5f7/0x650 [ 847.517724][T23878] ? security_file_permission+0x7c/0xa0 [ 847.523326][T23878] ? do_splice_direct+0x190/0x190 [ 847.528357][T23878] ? security_file_permission+0x87/0xa0 [ 847.533911][T23878] do_splice_direct+0x106/0x190 [ 847.538774][T23878] do_sendfile+0x675/0xc40 [ 847.543190][T23878] __x64_sys_sendfile64+0xb9/0x140 [ 847.548298][T23878] do_syscall_64+0x44/0xd0 [ 847.552754][T23878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 847.558649][T23878] RIP: 0033:0x7f9dc1d40af9 [ 847.563090][T23878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.582987][T23878] RSP: 002b:00007f9dc1496188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 847.591418][T23878] RAX: ffffffffffffffda RBX: 00007f9dc1e54028 RCX: 00007f9dc1d40af9 [ 847.599465][T23878] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 847.607455][T23878] RBP: 00007f9dc14961d0 R08: 0000000000000000 R09: 0000000000000000 [ 847.615508][T23878] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000001 [ 847.623475][T23878] R13: 00007ffd546b03bf R14: 00007f9dc1496300 R15: 0000000000022000 [ 847.631444][T23878] 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:13 executing program 3: recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/41, 0x29, 0x40, &(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xc00e0000) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x1718000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa3000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2000000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xeaffffff) 00:43:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) listen(r2, 0x4010072) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) (fail_nth: 3) 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb8000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2010000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb9000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 847.915349][T24456] FAULT_INJECTION: forcing a failure. [ 847.915349][T24456] name failslab, interval 1, probability 0, space 0, times 0 [ 847.928361][T24456] CPU: 1 PID: 24456 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 847.937126][T24456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.947181][T24456] Call Trace: [ 847.950459][T24456] [ 847.953384][T24456] dump_stack_lvl+0xd6/0x122 [ 847.957989][T24456] dump_stack+0x11/0x1b [ 847.962201][T24456] should_fail+0x23c/0x250 [ 847.966612][T24456] ? kcalloc+0x32/0x40 [ 847.970728][T24456] __should_failslab+0x81/0x90 [ 847.975487][T24456] should_failslab+0x5/0x20 [ 847.979992][T24456] __kmalloc+0x6f/0x370 [ 847.984146][T24456] ? kmem_cache_alloc_trace+0x24b/0x350 [ 847.989689][T24456] kcalloc+0x32/0x40 [ 847.993603][T24456] alloc_pipe_info+0x1be/0x350 [ 847.998371][T24456] splice_direct_to_actor+0x5f7/0x650 [ 848.003809][T24456] ? security_file_permission+0x7c/0xa0 [ 848.009487][T24456] ? do_splice_direct+0x190/0x190 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2200000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 848.014509][T24456] ? security_file_permission+0x87/0xa0 [ 848.020083][T24456] do_splice_direct+0x106/0x190 [ 848.024992][T24456] do_sendfile+0x675/0xc40 [ 848.029418][T24456] __x64_sys_sendfile64+0xb9/0x140 [ 848.034522][T24456] do_syscall_64+0x44/0xd0 [ 848.038951][T24456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 848.044933][T24456] RIP: 0033:0x7f9dc1d40af9 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2218000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x2500000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 848.049348][T24456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 848.068955][T24456] RSP: 002b:00007f9dc14b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 848.077362][T24456] RAX: ffffffffffffffda RBX: 00007f9dc1e53f60 RCX: 00007f9dc1d40af9 [ 848.085388][T24456] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 848.093361][T24456] RBP: 00007f9dc14b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 848.101331][T24456] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000001 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xefffffff) 00:43:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c00000007060101000000000000000006000000"], 0x1c}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 848.109299][T24456] R13: 00007ffd546b03bf R14: 00007f9dc14b7300 R15: 0000000000022000 [ 848.117273][T24456] 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) (fail_nth: 4) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xba000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3018000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xf0ffffff) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3418000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 848.145743][T24904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 848.177428][T24904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 848.220277][T25107] FAULT_INJECTION: forcing a failure. [ 848.220277][T25107] name failslab, interval 1, probability 0, space 0, times 0 [ 848.233150][T25107] CPU: 1 PID: 25107 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 848.241968][T25107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.252018][T25107] Call Trace: [ 848.255343][T25107] [ 848.258267][T25107] dump_stack_lvl+0xd6/0x122 [ 848.262862][T25107] dump_stack+0x11/0x1b 00:43:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbb000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x9, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 848.267081][T25107] should_fail+0x23c/0x250 [ 848.271566][T25107] ? kmalloc_array+0x2d/0x40 [ 848.276159][T25107] __should_failslab+0x81/0x90 [ 848.281017][T25107] should_failslab+0x5/0x20 [ 848.285515][T25107] __kmalloc+0x6f/0x370 [ 848.289739][T25107] kmalloc_array+0x2d/0x40 [ 848.294154][T25107] iter_file_splice_write+0xd5/0x790 [ 848.300160][T25107] ? atime_needs_update+0x2ba/0x390 [ 848.305363][T25107] ? touch_atime+0x11f/0x2e0 [ 848.309955][T25107] ? generic_file_splice_read+0x2a9/0x330 [ 848.315742][T25107] ? splice_from_pipe+0xd0/0xd0 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbc000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 848.320609][T25107] direct_splice_actor+0x80/0xa0 [ 848.325695][T25107] splice_direct_to_actor+0x345/0x650 [ 848.331071][T25107] ? do_splice_direct+0x190/0x190 [ 848.336203][T25107] do_splice_direct+0x106/0x190 [ 848.341056][T25107] do_sendfile+0x675/0xc40 [ 848.345491][T25107] __x64_sys_sendfile64+0xb9/0x140 [ 848.350733][T25107] do_syscall_64+0x44/0xd0 [ 848.355149][T25107] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 848.361113][T25107] RIP: 0033:0x7f9dc1d40af9 [ 848.365525][T25107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 848.385141][T25107] RSP: 002b:00007f9dc14b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 848.393592][T25107] RAX: ffffffffffffffda RBX: 00007f9dc1e53f60 RCX: 00007f9dc1d40af9 [ 848.401554][T25107] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 848.409585][T25107] RBP: 00007f9dc14b71d0 R08: 0000000000000000 R09: 0000000000000000 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xfeffffff) 00:43:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) socketpair(0x21, 0x2, 0x3, &(0x7f00000000c0)={0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000100)="ddf27751415fe7f934556269e2207c82826b720c7a367b95aa4fd713450e896e66e34ed15e3e6e9a2d", 0x29, 0x40804, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xf, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 848.417549][T25107] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000001 [ 848.425510][T25107] R13: 00007ffd546b03bf R14: 00007f9dc14b7300 R15: 0000000000022000 [ 848.433540][T25107] 00:43:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) (fail_nth: 5) 00:43:13 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x3f00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbd000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xffffff7f) 00:43:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) sendto$inet(r1, &(0x7f00000000c0)="657e856f295984995bfaedfe98351b9c01b118293a7d7b1f3621506209a62bf102e17d886c125f8a6d505929272ee6a9e5dba3303a3e6e35b0e6f36e0e661ba355f6f66485602006f1737464743802d661d139b4bc5ff3c303fc0b537155271077707d9fb4d8578b1900c7233a3e8c58b50cfc0e9e1759d1d6ea7acac4aeb0b4c756bf956b2b028188b3618d2bd51d93fb5006c5f931d5a0862a33402a144bb59da6a5e1c45f7ab40cd1107ed24374222c3e4c14d07fd55e7a73", 0xba, 0x4004, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4000000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000010c0)={0xffff0001, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3b}}}, 0x1}, 0x90) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r2, 0x0, 0x20, &(0x7f00000000c0)=""/4096, &(0x7f0000000040)=0x1000) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4000080000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 848.549147][T25816] FAULT_INJECTION: forcing a failure. [ 848.549147][T25816] name failslab, interval 1, probability 0, space 0, times 0 [ 848.562093][T25816] CPU: 1 PID: 25816 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 848.570855][T25816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.580912][T25816] Call Trace: [ 848.584245][T25816] [ 848.587174][T25816] dump_stack_lvl+0xd6/0x122 [ 848.591772][T25816] dump_stack+0x11/0x1b 00:43:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x40800, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) accept4$phonet_pipe(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20010, r2, 0x26537000) 00:43:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x64, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4102000000000000, 0x603}], 0x0, &(0x7f0000000000)) [ 848.596019][T25816] should_fail+0x23c/0x250 [ 848.600456][T25816] ? jbd2__journal_start+0xf7/0x3f0 [ 848.605722][T25816] __should_failslab+0x81/0x90 [ 848.610498][T25816] should_failslab+0x5/0x20 [ 848.615005][T25816] kmem_cache_alloc+0x4f/0x320 [ 848.619863][T25816] jbd2__journal_start+0xf7/0x3f0 [ 848.624957][T25816] __ext4_journal_start_sb+0x159/0x310 [ 848.630423][T25816] ? ext4_expand_extra_isize+0x560/0x560 [ 848.636131][T25816] ext4_dirty_inode+0x58/0xa0 [ 848.640897][T25816] __mark_inode_dirty+0x72/0x6c0 [ 848.645842][T25816] ? folio_unlock+0x29/0x40 [ 848.650421][T25816] generic_write_end+0x157/0x180 [ 848.652872][ T24] audit: type=1400 audit(1639096994.115:1645): avc: denied { execute } for pid=26213 comm="syz-executor.3" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 848.655363][T25816] ext4_da_write_end+0x4de/0x630 [ 848.684169][T25816] generic_perform_write+0x261/0x400 [ 848.689465][T25816] ? ext4_da_write_begin+0x590/0x590 [ 848.694820][T25816] ext4_buffered_write_iter+0x25b/0x380 [ 848.700371][T25816] ext4_file_write_iter+0x2e7/0x1200 [ 848.706145][T25816] ? __this_cpu_preempt_check+0x18/0x20 [ 848.711699][T25816] ? __perf_event_task_sched_in+0x898/0x8d0 [ 848.717586][T25816] ? save_fpregs_to_fpstate+0xf5/0x140 [ 848.723044][T25816] do_iter_readv_writev+0x2de/0x380 [ 848.728390][T25816] do_iter_write+0x192/0x5c0 [ 848.732985][T25816] ? splice_from_pipe_next+0x34f/0x3b0 [ 848.738443][T25816] ? kmalloc_array+0x2d/0x40 [ 848.743028][T25816] vfs_iter_write+0x4c/0x70 [ 848.747540][T25816] iter_file_splice_write+0x43a/0x790 [ 848.752932][T25816] ? splice_from_pipe+0xd0/0xd0 [ 848.757794][T25816] direct_splice_actor+0x80/0xa0 [ 848.762727][T25816] splice_direct_to_actor+0x345/0x650 [ 848.768113][T25816] ? do_splice_direct+0x190/0x190 [ 848.773240][T25816] do_splice_direct+0x106/0x190 [ 848.778189][T25816] do_sendfile+0x675/0xc40 [ 848.782728][T25816] __x64_sys_sendfile64+0xb9/0x140 [ 848.787836][T25816] do_syscall_64+0x44/0xd0 [ 848.792251][T25816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 848.798393][T25816] RIP: 0033:0x7f9dc1d40af9 [ 848.802837][T25816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 848.822441][T25816] RSP: 002b:00007f9dc14b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 848.833889][T25816] RAX: ffffffffffffffda RBX: 00007f9dc1e53f60 RCX: 00007f9dc1d40af9 [ 848.841901][T25816] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 848.849870][T25816] RBP: 00007f9dc14b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 848.857841][T25816] R10: 000000000000a198 R11: 0000000000000246 R12: 0000000000000001 [ 848.865821][T25816] R13: 00007ffd546b03bf R14: 00007f9dc14b7300 R15: 0000000000022000 [ 848.873796][T25816] 00:43:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbe000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080), 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) recvmsg(r2, &(0x7f0000002540)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f00000002c0)=""/4094, 0x480}], 0x42, 0x0, 0x3}, 0x0) recvfrom(r2, &(0x7f00000001c0)=""/202, 0xca, 0x2, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0xfb3, @rand_addr=' \x01\x00', 0x8}, 0x1c) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4202000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1c6, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xffffff9e) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4702000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x1004, 0x4) listen(r2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="1fa11387781c429dc14fa375973dfbd391ee4deea76a1ae9a1b17947a49ce82ae92b5154407ce6736e0295a6f8577119a2ee005144f3de9f9de519ceefd68b59255a", 0x42, 0x4000010, 0x0, 0x0) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xffffffea) 00:43:14 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4800000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbf000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1cc, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0)=0x2, 0xa198) 00:43:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xffffffef) 00:43:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x4c00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4000000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3b0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6000000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x24000, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1, 0x3, 0x5, 0x4, 0x0, 0xcc, 0x879, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x4, 0x7ff, 0x3ff, 0x3, 0x5, 0x4, 0x9, 0x0, 0xb770f31c, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r0, 0x2) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x3, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmmsg$unix(r0, &(0x7f00000026c0)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000002600)=[{0x0}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/60, 0x3c}, {&(0x7f0000001340)=""/245, 0xfffffffffffffe96}, {&(0x7f0000001440)=""/236, 0xec}, {&(0x7f0000002700)=""/4099, 0x1003}, {&(0x7f0000002540)=""/170, 0xaa}], 0x7}}], 0x1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0x26, &(0x7f0000000080)=0x7fff, 0x4) listen(r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) 00:43:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0xfffffff0) 00:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe1030000}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 00:43:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xc00, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:15 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6800000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="4c1f14a3aca8277e110a50fb084d1ac64407f52aecf90c000e3019c834064fb777060fc458cd40423ec9da6e96ea864b58607e30641081c4407f2a7c874a2527c1bdc6d3f392fcad6f7dd4141f0d3f440128bc76979391d6e9b38aaae373eef1bf48b884cd0154bb0925ecc5e7c3fbfa9bc0b18f9f795ddecb4b55074a7683e859ffa10bd325157af514840664d826aa1fe824921eaec0d738875153e8bbdd65eda24bd88405101a1bec8a9286480bef7587ac9df587183acd4351aba4795505db346be25e48080af8dead58146e727f3d0b3f39dfbd872292c22416deb95da7ae3f20137de34052dc47c9b76a6f3b8729", 0xf1}, {0x0}, {&(0x7f00000002c0)="14e4df49c61c7eec58331033722a2f6132cdaef4b204f79eb9b6120f98544e5e62dcde16b7f438e70e223a9f77fbc8cef3540e91cea1b64e4021a44f9ab3125c47ec3764144dfa5041d1969caba57ac5db666a1202721e41af375ef5247084279f3064dd28654d87fe813f5e7f9298f906791eec54c0d9c42b2e8be4e27d4f929059c8a1c504a4374dedcc1e73a8686aad87bf36dd4d526a3c44a45be79d632a6d088c41a17e06684cbc14cd9db0", 0xae}, {&(0x7f00000007c0)="3e0325d8647db600ba7adb09e06e31a456dc4133b4cc75ee52173ea74bd3e4", 0x1f}, {&(0x7f0000000c80)}], 0x5, 0x4, 0x9bda, 0x4) getrlimit(0x6, &(0x7f0000000480)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) sendfile(r0, r0, &(0x7f00000001c0)=0x4, 0xa198) 00:43:16 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000140)="eb3c906d8d66730ed3010100028001000240000004f801d0", 0x18}, {0x0, 0x6c00000000000000, 0x603}], 0x0, &(0x7f0000000000)) 00:43:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1600, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240