adcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:04 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x224, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x7c}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x7fff}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x4}, {0x8, 0x0, 0x2}]}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0xa456}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x101}, @NL80211_ATTR_SCAN_SUPP_RATES={0x178, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x4}, @NL80211_BAND_5GHZ={0xfd, 0x1, "4b831ec7dd8bb9436fbad4476075292db84ea252912d994fa5b248078736700dfbb5d47f103b0e8cb90c802b025fcff4d0c93fdb6eb7187278e87ecf6f2dcffca45b717c83f104f564bbc192b3bf76fd1026a92c8a82c7806463f55b22d14ae2a38c95909b57e13648e362082490c33644726cd3c91f3998ebaabed1a1283276f3476ab1a7bff2b7e3b72cda38418a1d53423a98b07b493098cfb4cf262f9afdb3ac5f9d4a5c0481003ecf92c6cec5646e0898a69b7b52210a1fe17df6175dbebf0ac2c0564f6cb58513018b7f57b3b19d99040642a6a712288a036993222eefa32bc8cf8ff8691da29a4761cbab888c3f90b11c1fe3e042c1"}, @NL80211_BAND_2GHZ={0x6e, 0x0, "0d73350ed29fb0af042c4cff08fcd8f448c119815c2c015974053d0c3ab94a74853d6dfe8b40450308fa1b2a042f3b36f1100a3258b239db6a4da63453be3bb2c3cf4b5da2a4b11f5766b1721916c3ee9c063bebe57b72d647789fc6b02cca622431d996160b99756c68"}]}, @NL80211_ATTR_SCAN_SSIDS={0x48, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x6, 0x0, @random="3ad5"}, {0xf, 0x0, @random="f41b57a059b8f15bd66f05"}, {0x6, 0x0, @random="7c89"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0xe}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x1, 0x5}}]}, 0x224}, 0x1, 0x0, 0x0, 0x1004c010}, 0x40003) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 01:46:04 executing program 6: syz_open_dev$char_usb(0xc, 0xb4, 0x1679) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@local, @loopback}, &(0x7f0000000040)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x401, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:04 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x3c, r1, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x0, 0x3, 0x3, 0x0, {0x7f, 0x5, 0x0, 0x3c0, 0x0, 0x1, 0x1}, 0x6, 0x3ff, 0x1}}]}, 0x3c}}, 0x20000000) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000008c0), 0x440c0, 0x0) 01:46:04 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000580)={0x0, 0x0, 0x6, 0x13, 0x0, &(0x7f0000000180)="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"}) openat$full(0xffffffffffffff9c, &(0x7f00000009c0), 0xc00800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:04 executing program 7: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:04 executing program 6: syz_open_dev$char_usb(0xc, 0xb4, 0x1679) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@local, @loopback}, &(0x7f0000000040)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x401, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:04 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x3c, r1, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x0, 0x3, 0x3, 0x0, {0x7f, 0x5, 0x0, 0x3c0, 0x0, 0x1, 0x1}, 0x6, 0x3ff, 0x1}}]}, 0x3c}}, 0x20000000) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:04 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:04 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000580)={0x0, 0x0, 0x6, 0x13, 0x0, &(0x7f0000000180)="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"}) openat$full(0xffffffffffffff9c, &(0x7f00000009c0), 0xc00800, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:04 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, r1, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1, 0x1}}}}, [@NL80211_ATTR_KEY={0x18, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xf294cd7865b4cf91}, @NL80211_KEY_SEQ={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "dfa7180d85cf15ff5deb6deacb"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "41d4aa7982d349551249a9be6b"}]}, 0x6c}, 0x1, 0x0, 0x0, 0x884}, 0x2004c000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000440)={'wlan1\x00'}) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:04 executing program 6: syz_open_dev$char_usb(0xc, 0xb4, 0x1679) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@local, @loopback}, &(0x7f0000000040)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x401, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:04 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x3c, r1, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x0, 0x3, 0x3, 0x0, {0x7f, 0x5, 0x0, 0x3c0, 0x0, 0x1, 0x1}, 0x6, 0x3ff, 0x1}}]}, 0x3c}}, 0x20000000) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:04 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:04 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) r2 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 01:46:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:04 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:15 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:15 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:15 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000580)={0x0, 0x0, 0x6, 0x13, 0x0, &(0x7f0000000180)="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"}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:15 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:15 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:15 executing program 6: syz_open_dev$char_usb(0xc, 0xb4, 0x1679) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@local, @loopback}, &(0x7f0000000040)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:15 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, r1, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1, 0x1}}}}, [@NL80211_ATTR_KEY={0x18, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xf294cd7865b4cf91}, @NL80211_KEY_SEQ={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "dfa7180d85cf15ff5deb6deacb"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "41d4aa7982d349551249a9be6b"}]}, 0x6c}, 0x1, 0x0, 0x0, 0x884}, 0x2004c000) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:15 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@version_9p2000}, {@nodevmap}, {@loose}], [{@obj_role}, {@euid_gt={'euid>', 0xee01}}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:15 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:15 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:24 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:24 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:24 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:24 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:24 executing program 6: syz_open_dev$char_usb(0xc, 0xb4, 0x1679) openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:24 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@version_9p2000}, {@nodevmap}], [{@obj_role}, {@euid_gt={'euid>', 0xee01}}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:24 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:24 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:24 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:24 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@version_9p2000}], [{@obj_role}, {@euid_gt={'euid>', 0xee01}}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:24 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:24 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:24 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000000)=0x1ff, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:24 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:24 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:24 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:24 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:24 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}], [{@obj_role}, {@euid_gt={'euid>', 0xee01}}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:24 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:24 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:33 executing program 4: r0 = socket(0x15, 0x6, 0x7c8000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 01:46:33 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:33 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:33 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:33 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:46:33 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[], [{@obj_role}, {@euid_gt={'euid>', 0xee01}}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:33 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:33 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={'trans=tcp,', {}, 0x2c, {[], [{@obj_role}]}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:33 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:33 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:33 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:33 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:46:33 executing program 4: socket(0x15, 0x6, 0x7c8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 01:46:43 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:46:43 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000ec0)) 01:46:43 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x1b}, @void, @val={0xc, 0x99, {0x20, 0x39}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:46:43 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 01:46:43 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:43 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:43 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_GET_FS(0x1003, 0x0) 01:46:43 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:43 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:43 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_GET_FS(0x1003, 0x0) 01:46:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:43 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:43 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 277.955937] vfat: Unknown parameter 'appraise' 01:46:43 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:46:43 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:43 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:52 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:52 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:46:52 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:52 executing program 0: mount$9p_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_GET_FS(0x1003, 0x0) 01:46:52 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:46:52 executing program 5: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:52 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:52 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:46:52 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:46:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:52 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:46:52 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:52 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:52 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:46:52 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:46:52 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:46:52 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:00 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:00 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:00 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:00 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:00 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:00 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 295.136994] vfat: Unknown parameter 'appraise' 01:47:00 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:00 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 295.347964] vfat: Unknown parameter 'appraise' 01:47:09 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:09 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:09 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:09 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:09 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100), 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:09 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:09 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:09 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 303.775007] vfat: Unknown parameter 'appraise' 01:47:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:09 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100), 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:09 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 304.006797] vfat: Unknown parameter 'appraise' 01:47:17 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100), 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:17 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:17 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:17 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:17 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:17 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) [ 312.082959] vfat: Unknown parameter 'appraise' 01:47:17 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:17 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:17 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 312.248398] No source specified 01:47:17 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:17 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:17 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:17 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:17 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:17 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) [ 312.446224] No source specified [ 312.504275] vfat: Unknown parameter 'appraise' 01:47:26 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:26 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:26 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:26 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:26 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:26 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 321.386578] vfat: Unknown parameter 'appraise' [ 321.410426] No source specified 01:47:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:26 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:26 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:26 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:26 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:27 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 321.595282] vfat: Unknown parameter 'appraise' 01:47:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) [ 321.657159] Zero length message leads to an empty skb 01:47:27 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 321.691687] No source specified 01:47:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:35 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:35 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:35 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:47:35 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:35 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:35 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:35 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) [ 330.342061] No source specified 01:47:35 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:47:35 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:35 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 330.466463] No source specified 01:47:45 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:45 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:47:45 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:47:45 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:45 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:47:45 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:47:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) [ 339.634185] No source specified 01:47:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:45 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:47:45 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {0x0, 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:45 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:45 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:47:45 executing program 4: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x7, 0x4, "383713"}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7c2f1505af056659287d1e5e1d"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:47:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:45 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {0x0, 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 339.864942] No source specified 01:47:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, r0) 01:47:54 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:54 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:54 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {0x0, 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:47:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:47:54 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:47:54 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 348.963035] No source specified 01:47:54 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:47:54 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:47:54 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780), 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:48:04 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780), 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:04 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:48:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, r0) 01:48:04 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x0, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:48:04 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) [ 358.645282] No source specified 01:48:04 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:48:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:04 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x74, 0x0) 01:48:04 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780), 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 358.897088] No source specified 01:48:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, r0) 01:48:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:04 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:48:04 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x6c, 0x0) 01:48:04 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 359.128663] No source specified 01:48:12 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x624000, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:12 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:12 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x64, 0x0) 01:48:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:12 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x0, 0x1}, 0x14}}, 0x20000000) 01:48:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:48:12 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:48:12 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f", 0x34, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 367.023671] No source specified 01:48:12 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x5c, 0x0) [ 367.089738] No source specified 01:48:12 executing program 6: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 01:48:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x54, 0x0) 01:48:21 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:48:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:21 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:48:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f", 0x34, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:21 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:21 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 375.923956] No source specified 01:48:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f", 0x34, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:21 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:21 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)) 01:48:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x4c, 0x0) 01:48:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:21 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 376.131557] No source specified 01:48:21 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:21 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x4c, 0x0) 01:48:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), 0xffffffffffffffff) 01:48:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 376.278132] No source specified 01:48:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:29 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:29 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:29 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:48:29 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:29 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:29 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) [ 384.487069] No source specified 01:48:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) 01:48:30 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x3c, 0x0) [ 384.591142] No source specified 01:48:30 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:30 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0", 0x5b, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:30 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:30 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x3c, 0x0) [ 384.695297] No source specified 01:48:39 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) 01:48:39 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:39 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x3c, 0x0) 01:48:39 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:39 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:39 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 394.448890] No source specified 01:48:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:40 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:48:40 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:40 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:40 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 394.764939] No source specified 01:48:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:40 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:50 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:50 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:50 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:48:50 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:50 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:50 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x4}}, 0x3c, 0x0) 01:48:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 405.456179] No source specified 01:48:51 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:51 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}], {0x10, 0x4}}, 0x34, 0x0) 01:48:51 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:48:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:48:51 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14", 0x55, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 405.725833] No source specified 01:48:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) 01:48:51 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:48:51 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:51 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:48:51 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:48:51 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 405.957121] No source specified 01:49:00 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:00 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:00 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c", 0x4f, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:00 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) 01:49:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 414.726239] No source specified 01:49:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:00 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:49:00 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 414.947992] No source specified 01:49:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) 01:49:00 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:00 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) [ 415.106104] vfat: Unknown parameter 'appraise' 01:49:09 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:09 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:49:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x34, 0x0) 01:49:09 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:09 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:09 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:09 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 424.318763] No source specified [ 424.336927] vfat: Unknown parameter 'appraise' 01:49:09 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x34, 0x0) 01:49:09 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:09 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:09 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 424.532450] No source specified [ 424.543293] vfat: Unknown parameter 'appraise' 01:49:10 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:10 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:49:19 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:19 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x624000, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) 01:49:19 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:19 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:19 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 01:49:19 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:19 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad", 0x4c, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 433.593399] No source specified 01:49:19 executing program 5: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:19 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) [ 433.656405] No source specified 01:49:19 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:19 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 01:49:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:19 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad", 0x4c, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 433.769497] No source specified 01:49:29 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 01:49:29 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:29 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:29 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:29 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:29 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:29 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) [ 443.911315] No source specified 01:49:29 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:29 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:29 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8b", 0x46, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:29 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:29 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:29 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:29 executing program 5: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) [ 444.192459] No source specified 01:49:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:29 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:49:37 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:37 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8b", 0x46, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:37 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:37 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:49:37 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:49:37 executing program 5: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:37 executing program 5: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:49:37 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:47 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8b", 0x46, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:47 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:47 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:49:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:47 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:47 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:47 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) 01:49:47 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:47 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a", 0x48, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:47 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:49:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x114, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:47 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:47 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:47 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a", 0x48, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:47 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 01:49:47 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:47 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:49:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:49:55 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) 01:49:55 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:55 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:55 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:49:55 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:49:55 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:55 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a", 0x48, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:49:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0xc0, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 470.456421] kmemleak: Found object by alias at 0x607f1a639344 [ 470.456445] CPU: 1 UID: 0 PID: 6174 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 470.456472] Tainted: [W]=WARN [ 470.456477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 470.456486] Call Trace: [ 470.456491] [ 470.456497] dump_stack_lvl+0xca/0x120 [ 470.456530] __lookup_object+0x94/0xb0 [ 470.456551] delete_object_full+0x27/0x70 [ 470.456572] free_percpu+0x30/0x1160 [ 470.456592] ? arch_uprobe_clear_state+0x16/0x140 [ 470.456618] futex_hash_free+0x38/0xc0 [ 470.456637] mmput+0x2d3/0x390 [ 470.456661] do_exit+0x79d/0x2970 [ 470.456678] ? lock_release+0xc8/0x290 [ 470.456700] ? __pfx_do_exit+0x10/0x10 [ 470.456718] ? find_held_lock+0x2b/0x80 [ 470.456740] ? get_signal+0x835/0x2340 [ 470.456765] do_group_exit+0xd3/0x2a0 [ 470.456784] get_signal+0x2315/0x2340 [ 470.456807] ? __pfx_signal_setup_done+0x10/0x10 [ 470.456835] ? __pfx_get_signal+0x10/0x10 [ 470.456856] ? do_futex+0x135/0x370 [ 470.456874] ? __pfx_do_futex+0x10/0x10 [ 470.456889] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 470.456908] arch_do_signal_or_restart+0x80/0x790 [ 470.456930] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 470.456951] ? __x64_sys_futex+0x1c9/0x4d0 [ 470.456967] ? __x64_sys_futex+0x1d2/0x4d0 [ 470.456986] ? __pfx___x64_sys_futex+0x10/0x10 [ 470.457002] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 470.457026] exit_to_user_mode_loop+0x8b/0x110 [ 470.457043] do_syscall_64+0x2f7/0x360 [ 470.457058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 470.457074] RIP: 0033:0x7fb4ed456b19 [ 470.457085] Code: Unable to access opcode bytes at 0x7fb4ed456aef. [ 470.457092] RSP: 002b:00007fb4ea9cc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 470.457106] RAX: fffffffffffffe00 RBX: 00007fb4ed569f68 RCX: 00007fb4ed456b19 [ 470.457117] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb4ed569f68 [ 470.457126] RBP: 00007fb4ed569f60 R08: 0000000000000000 R09: 0000000000000000 [ 470.457135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4ed569f6c [ 470.457144] R13: 00007ffffab962bf R14: 00007fb4ea9cc300 R15: 0000000000022000 [ 470.457165] [ 470.457170] kmemleak: Object (percpu) 0x607f1a639340 (size 8): [ 470.457178] kmemleak: comm "syz-executor.5", pid 6174, jiffies 4295137171 [ 470.457187] kmemleak: min_count = 1 [ 470.457192] kmemleak: count = 0 [ 470.457197] kmemleak: flags = 0x21 [ 470.457202] kmemleak: checksum = 0 [ 470.457206] kmemleak: backtrace: [ 470.457211] pcpu_alloc_noprof+0x87a/0x1170 [ 470.457230] __alloc_workqueue+0x74b/0x1820 [ 470.457252] alloc_workqueue_noprof+0xc7/0x200 [ 470.457264] loop_configure+0xf73/0x1590 [ 470.457282] lo_ioctl+0x66d/0x1c70 [ 470.457298] blkdev_ioctl+0x27c/0x6c0 [ 470.457320] __x64_sys_ioctl+0x18f/0x210 [ 470.457339] do_syscall_64+0xbf/0x360 [ 470.457350] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:49:55 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:49:55 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:49:55 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:49:56 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:05 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 01:50:05 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:50:05 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:50:05 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:05 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:05 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:05 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:50:06 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:06 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:06 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:06 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:06 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:06 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:50:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}}, 0x80) 01:50:06 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 01:50:06 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}}, 0x0) 01:50:06 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:15 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:15 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:15 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:15 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:50:15 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:15 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:15 executing program 1: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 01:50:15 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 01:50:15 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:15 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:15 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:23 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 01:50:23 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:23 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:23 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:23 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:23 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:23 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:23 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:24 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:24 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:24 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:24 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:24 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 01:50:24 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0, 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:24 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:33 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0, 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:33 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:33 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:33 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:33 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:33 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:33 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0, 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:33 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:33 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:33 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:33 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:43 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:43 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:43 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:43 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:43 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:50:43 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:43 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:43 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:43 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:43 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:43 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:43 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:51 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:51 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:51 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:51 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:51 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:51 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:51 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:50:51 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:50:51 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:50:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:50:51 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa", 0x19, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:00 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:00 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa", 0x19, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:00 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:00 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:08 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:08 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:08 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:08 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:08 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:08 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:08 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:08 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:08 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:08 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:51:09 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:09 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:09 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:09 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:51:09 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:09 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:51:18 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:51:18 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:51:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:18 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:51:18 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:18 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:51:18 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, 0x0) 01:51:18 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:18 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:27 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:51:27 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:51:27 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:27 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:27 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:51:27 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:27 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:51:37 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:37 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:37 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:51:37 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 01:51:37 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad", 0x4c, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:37 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:51:38 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:38 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:38 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:51:46 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:46 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:51:46 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:46 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 581.434199] No source specified 01:51:46 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:46 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:51:46 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:51:47 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:47 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) [ 581.619634] No source specified 01:51:56 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:51:56 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:56 executing program 4: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:56 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:56 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:51:56 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:56 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:51:56 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:51:56 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 591.185626] No source specified 01:51:56 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:51:56 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:56 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:51:56 executing program 7: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:51:56 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:52:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:52:06 executing program 7: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) 01:52:06 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 7: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:06 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:52:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 4: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:52:06 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:06 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:16 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:52:16 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:16 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:16 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:16 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) 01:52:16 executing program 4: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:52:16 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:16 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:16 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:16 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:16 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:52:16 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:52:16 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) 01:52:16 executing program 4: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 01:52:16 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:16 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:17 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:17 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:24 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:24 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:52:24 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:24 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:24 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) 01:52:24 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:52:24 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:24 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:25 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:25 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:52:25 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:25 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:52:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:52:25 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:25 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:33 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:33 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:33 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:52:33 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 01:52:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x0, 0x0) 01:52:33 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:33 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:33 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:43 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:52:43 executing program 6: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:43 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:43 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:52:43 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:52:43 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 01:52:43 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:43 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:43 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a009", 0x3c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:51 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)) 01:52:51 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:51 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:51 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:51 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:52:51 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:51 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:51 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:52 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:52 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:52:52 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:52 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:52:52 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:52:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 646.778974] No source specified 01:52:52 executing program 6: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:52:52 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:00 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:53:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 6: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:53:00 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 655.344961] No source specified 01:53:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:53:00 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:00 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:00 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:00 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_win95}], [{@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:00 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 655.536872] No source specified 01:53:09 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)) 01:53:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:53:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 6: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:53:09 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:09 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 664.383884] No source specified 01:53:09 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:09 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:53:09 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 664.503977] No source specified 01:53:18 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, 0x0) 01:53:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:18 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:53:18 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:18 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:18 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:18 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:18 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 673.587379] No source specified 01:53:19 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:19 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:19 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:19 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, 0x0) 01:53:19 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:19 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:19 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:19 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 673.797846] No source specified 01:53:19 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:53:19 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:19 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:19 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 673.953310] No source specified 01:53:27 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, 0x0) 01:53:27 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:27 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:53:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:27 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:27 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x0, 0x0) 01:53:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 681.803989] No source specified 01:53:27 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 681.887938] No source specified 01:53:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:27 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:27 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 681.995835] No source specified 01:53:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:36 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:36 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:36 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:36 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:36 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) 01:53:36 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) [ 690.924682] No source specified 01:53:36 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:53:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:36 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 691.024071] No source specified 01:53:36 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:36 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:36 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) [ 691.138725] No source specified 01:53:44 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) 01:53:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:44 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:44 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:44 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:44 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x0, 0x0) 01:53:44 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:53:44 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) [ 699.225880] No source specified 01:53:44 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:44 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) [ 699.300147] No source specified 01:53:44 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:44 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:55 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:55 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:53:55 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:55 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:55 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:55 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) 01:53:55 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:55 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) [ 709.759783] No source specified 01:53:55 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:55 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:53:55 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:53:55 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:53:55 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:53:55 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:53:55 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) [ 710.004080] No source specified 01:54:05 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) 01:54:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:54:05 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:05 executing program 6: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 01:54:05 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:05 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:05 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:05 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:54:05 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) 01:54:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:05 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:54:05 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:05 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, 0x0) 01:54:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:05 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:05 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:18 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:18 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:18 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a009", 0x3c}], 0x3800020, 0x0) 01:54:18 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:18 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:18 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:18 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:18 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:54:27 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:27 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:27 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:27 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:27 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:27 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:27 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:27 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:27 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:35 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:54:35 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:35 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:35 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:35 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92", 0x40}], 0x3800020, 0x0) 01:54:35 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:35 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:35 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:35 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:35 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:54:35 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:36 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, 0x0) 01:54:43 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:43 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:54:43 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:43 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:43 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:52 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:52 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a", 0xe}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:52 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:52 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:52 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:52 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, 0x0) 01:54:52 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, 0x0) 01:54:52 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, 0x0) 01:54:52 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:52 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:52 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:54:52 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7f", 0x39}], 0x3800020, 0x0) 01:54:52 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:54:52 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:54:52 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:54:52 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) [ 767.343232] No source specified 01:55:00 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:55:00 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:00 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:00 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:55:00 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 774.639933] No source specified 01:55:00 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:00 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:00 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:00 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:55:00 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) [ 774.804225] No source specified 01:55:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:09 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341", 0x7}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:09 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:09 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:09 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:55:09 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:55:09 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:09 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) [ 783.630323] No source specified 01:55:09 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:09 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:55:09 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) [ 783.731868] No source specified 01:55:09 executing program 3: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:09 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:55:09 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:18 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:18 executing program 3: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:18 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:18 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:18 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:55:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {0x0}], 0x3800020, 0x0) 01:55:18 executing program 3: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:18 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 792.942595] No source specified 01:55:18 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:55:18 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:18 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:18 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:18 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:18 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) [ 793.177638] No source specified 01:55:27 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:27 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:55:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:27 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:27 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:27 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) [ 802.249096] No source specified 01:55:27 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:55:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e", 0x4}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:27 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:27 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:27 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) [ 802.481312] No source specified 01:55:27 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:37 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c", 0x20}], 0x3800020, 0x0) 01:55:37 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:37 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:37 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x3800020, 0x0) 01:55:37 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:37 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 811.726914] No source specified 01:55:37 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:37 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:37 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) [ 811.809042] No source specified [ 811.810218] No source specified 01:55:45 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:45 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:45 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:55:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:45 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:45 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:45 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4", 0x3a}], 0x0, 0x0) [ 820.009420] No source specified 01:55:45 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:45 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 820.042904] No source specified 01:55:45 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:45 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:55:45 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:45 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:45 executing program 6: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 820.259161] No source specified [ 820.273325] No source specified 01:55:55 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:55 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:55 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:55 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c78", 0x10}], 0x3800020, 0x0) 01:55:55 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:55:55 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:55 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:55 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) [ 830.005313] No source specified 01:55:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a", 0xe}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:55:55 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:55 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) 01:55:55 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:55:55 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:55 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:55:55 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) [ 830.189913] No source specified 01:56:03 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:03 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:03 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:03 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:03 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:03 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:03 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:03 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:03 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:03 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:03 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:03 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:03 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:12 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:12 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:12 executing program 0: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:12 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:12 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:12 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fd", 0x8}], 0x3800020, 0x0) 01:56:12 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:12 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:12 executing program 0: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:12 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341", 0x7}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:13 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c", 0x1c}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:13 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:13 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:13 executing program 0: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:13 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:13 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:56:13 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:13 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:22 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:56:22 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:22 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:22 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:22 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:22 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:22 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:22 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:22 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:22 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:22 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:22 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:23 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:23 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:32 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341", 0x7}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:32 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:32 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:56:32 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:32 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:32 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e", 0x4}], 0x3800020, 0x0) 01:56:32 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:32 executing program 0: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:56:32 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:32 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:56:32 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:32 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:32 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:41 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:56:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e", 0x4}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:41 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:41 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:56:41 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 876.079064] No source specified 01:56:41 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}]}, 0x2c, 0x0) 01:56:41 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:56:41 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:41 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:41 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac", 0x38}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 876.203188] No source specified 01:56:41 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0", 0x25}], 0x3800020, 0x0) 01:56:41 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) [ 876.259435] No source specified 01:56:41 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:41 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:41 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, 0x0) 01:56:41 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24e", 0x37}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 876.377328] No source specified 01:56:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:50 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:50 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:56:50 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:50 executing program 0: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:56:50 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:50 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:50 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470", 0x2}], 0x3800020, 0x0) 01:56:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 885.178808] No source specified 01:56:50 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, 0x0) 01:56:50 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:50 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:56:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 885.383222] No source specified 01:56:59 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:56:59 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:59 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:56:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:59 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) 01:56:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) 01:56:59 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:59 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) [ 894.304372] No source specified 01:56:59 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) 01:56:59 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{0x0}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 894.381757] No source specified 01:56:59 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) [ 894.479202] No source specified 01:56:59 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a30", 0x49, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:56:59 executing program 2: sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:57:08 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:57:08 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) 01:57:08 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c", 0x4f, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:08 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300), 0x24, 0x0) 01:57:08 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:57:08 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:57:08 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 903.466212] No source specified [ 903.483373] No source specified 01:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 903.500903] No source specified 01:57:08 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x4}}, 0x3c, 0x0) 01:57:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:09 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) [ 903.574199] No source specified 01:57:09 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:09 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:09 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:19 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:57:19 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:57:19 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:57:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:19 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x4}}, 0x3c, 0x0) 01:57:19 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:57:19 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) 01:57:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 914.256034] No source specified 01:57:19 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) [ 914.281480] No source specified [ 914.329263] kmemleak: Found object by alias at 0x607f1a62a618 [ 914.329281] CPU: 1 UID: 0 PID: 8247 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 914.329299] Tainted: [W]=WARN [ 914.329303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.329310] Call Trace: [ 914.329315] [ 914.329319] dump_stack_lvl+0xca/0x120 [ 914.329343] __lookup_object+0x94/0xb0 [ 914.329361] delete_object_full+0x27/0x70 [ 914.329376] free_percpu+0x30/0x1160 [ 914.329392] ? arch_uprobe_clear_state+0x16/0x140 [ 914.329412] futex_hash_free+0x38/0xc0 [ 914.329426] mmput+0x2d3/0x390 [ 914.329444] do_exit+0x79d/0x2970 [ 914.329462] ? signal_wake_up_state+0x85/0x120 [ 914.329477] ? zap_other_threads+0x2b9/0x3a0 [ 914.329492] ? __pfx_do_exit+0x10/0x10 [ 914.329505] ? do_group_exit+0x1c3/0x2a0 [ 914.329518] ? lock_release+0xc8/0x290 [ 914.329534] do_group_exit+0xd3/0x2a0 [ 914.329549] __x64_sys_exit_group+0x3e/0x50 [ 914.329562] x64_sys_call+0x18c5/0x18d0 [ 914.329577] do_syscall_64+0xbf/0x360 [ 914.329589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.329600] RIP: 0033:0x7ff07166db19 [ 914.329608] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 914.329613] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 914.329624] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 914.329632] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 914.329639] RBP: 0000000000000000 R08: 0000001b2cf213a0 R09: 0000000000000000 [ 914.329645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.329652] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 914.329667] [ 914.329671] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 914.329677] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295581037 [ 914.329684] kmemleak: min_count = 1 [ 914.329688] kmemleak: count = 0 [ 914.329691] kmemleak: flags = 0x21 [ 914.329695] kmemleak: checksum = 0 [ 914.329699] kmemleak: backtrace: [ 914.329702] pcpu_alloc_noprof+0x87a/0x1170 [ 914.329717] __percpu_counter_init_many+0x44/0x360 [ 914.329730] mm_init+0xcac/0x1170 [ 914.329738] copy_process+0x3ab7/0x73c0 [ 914.329747] kernel_clone+0xea/0x7f0 [ 914.329757] __do_sys_clone+0xce/0x120 [ 914.329766] do_syscall_64+0xbf/0x360 [ 914.329775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.367362] kmemleak: Found object by alias at 0x607f1a62a61c [ 914.367392] CPU: 0 UID: 0 PID: 8248 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 914.367427] Tainted: [W]=WARN [ 914.367435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.367455] Call Trace: [ 914.367462] [ 914.367471] dump_stack_lvl+0xca/0x120 [ 914.367511] __lookup_object+0x94/0xb0 [ 914.367542] delete_object_full+0x27/0x70 [ 914.367573] free_percpu+0x30/0x1160 [ 914.367603] ? arch_uprobe_clear_state+0x16/0x140 [ 914.367641] futex_hash_free+0x38/0xc0 [ 914.367667] mmput+0x2d3/0x390 [ 914.367704] do_exit+0x79d/0x2970 [ 914.367730] ? lock_release+0xc8/0x290 [ 914.367762] ? __pfx_do_exit+0x10/0x10 [ 914.367789] ? find_held_lock+0x2b/0x80 [ 914.367822] ? get_signal+0x835/0x2340 [ 914.367859] do_group_exit+0xd3/0x2a0 [ 914.367888] get_signal+0x2315/0x2340 [ 914.367932] ? __pfx_get_signal+0x10/0x10 [ 914.367963] ? do_futex+0x135/0x370 [ 914.367990] ? __pfx_do_futex+0x10/0x10 [ 914.368019] arch_do_signal_or_restart+0x80/0x790 [ 914.368052] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 914.368083] ? __x64_sys_futex+0x1c9/0x4d0 [ 914.368107] ? __x64_sys_futex+0x1d2/0x4d0 [ 914.368136] ? __pfx___x64_sys_futex+0x10/0x10 [ 914.368160] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 914.368195] exit_to_user_mode_loop+0x8b/0x110 [ 914.368219] do_syscall_64+0x2f7/0x360 [ 914.368242] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.368264] RIP: 0033:0x7f61678c2b19 [ 914.368281] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 914.368291] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 914.368312] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 914.368327] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 914.368340] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 914.368354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 914.368367] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 914.368398] [ 914.368405] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 914.368418] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295581037 [ 914.368432] kmemleak: min_count = 1 [ 914.368439] kmemleak: count = 0 [ 914.368446] kmemleak: flags = 0x21 [ 914.368453] kmemleak: checksum = 0 [ 914.368460] kmemleak: backtrace: [ 914.368467] pcpu_alloc_noprof+0x87a/0x1170 [ 914.368495] __percpu_counter_init_many+0x44/0x360 [ 914.368519] mm_init+0xcac/0x1170 [ 914.368535] copy_process+0x3ab7/0x73c0 [ 914.368554] kernel_clone+0xea/0x7f0 [ 914.368573] __do_sys_clone+0xce/0x120 [ 914.368592] do_syscall_64+0xbf/0x360 [ 914.368609] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:57:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:57:19 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)}], 0x3800020, 0x0) 01:57:19 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x4}}, 0x3c, 0x0) [ 914.432041] No source specified 01:57:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:28 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:57:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:57:28 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:57:28 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 01:57:28 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:28 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:28 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300), 0x24, 0x0) [ 923.489955] No source specified 01:57:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:29 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 923.532571] No source specified 01:57:29 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) [ 923.586291] kmemleak: Found object by alias at 0x607f1a62a618 [ 923.586307] CPU: 1 UID: 0 PID: 8282 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 923.586325] Tainted: [W]=WARN [ 923.586329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 923.586336] Call Trace: [ 923.586340] [ 923.586345] dump_stack_lvl+0xca/0x120 [ 923.586369] __lookup_object+0x94/0xb0 [ 923.586386] delete_object_full+0x27/0x70 [ 923.586402] free_percpu+0x30/0x1160 [ 923.586418] ? arch_uprobe_clear_state+0x16/0x140 [ 923.586438] futex_hash_free+0x38/0xc0 [ 923.586456] mmput+0x2d3/0x390 [ 923.586474] do_exit+0x79d/0x2970 [ 923.586488] ? signal_wake_up_state+0x85/0x120 [ 923.586504] ? zap_other_threads+0x2b9/0x3a0 [ 923.586520] ? __pfx_do_exit+0x10/0x10 01:57:29 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) [ 923.586532] ? do_group_exit+0x1c3/0x2a0 [ 923.586545] ? lock_release+0xc8/0x290 [ 923.586562] do_group_exit+0xd3/0x2a0 [ 923.586577] __x64_sys_exit_group+0x3e/0x50 [ 923.586590] x64_sys_call+0x18c5/0x18d0 [ 923.586605] do_syscall_64+0xbf/0x360 [ 923.586617] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 923.586629] RIP: 0033:0x7ff07166db19 [ 923.586637] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 923.586643] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 923.586653] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 923.586661] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 923.586668] RBP: 0000000000000000 R08: 0000001b2cf213a8 R09: 0000000000000000 [ 923.586675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 923.586682] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 923.586698] [ 923.586702] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 923.586709] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295590324 [ 923.586716] kmemleak: min_count = 1 [ 923.586720] kmemleak: count = 0 [ 923.586723] kmemleak: flags = 0x21 [ 923.586734] kmemleak: checksum = 0 [ 923.586738] kmemleak: backtrace: [ 923.586742] pcpu_alloc_noprof+0x87a/0x1170 [ 923.586757] __percpu_counter_init_many+0x44/0x360 [ 923.586770] mm_init+0xcac/0x1170 [ 923.586778] copy_process+0x3ab7/0x73c0 [ 923.586787] kernel_clone+0xea/0x7f0 [ 923.586797] __do_sys_clone+0xce/0x120 [ 923.586807] do_syscall_64+0xbf/0x360 [ 923.586815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 923.605760] kmemleak: Found object by alias at 0x607f1a62a61c [ 923.605791] CPU: 0 UID: 0 PID: 8290 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 923.605826] Tainted: [W]=WARN [ 923.605834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 923.605846] Call Trace: [ 923.605854] [ 923.605862] dump_stack_lvl+0xca/0x120 [ 923.605906] __lookup_object+0x94/0xb0 [ 923.605937] delete_object_full+0x27/0x70 [ 923.605968] free_percpu+0x30/0x1160 [ 923.605998] ? arch_uprobe_clear_state+0x16/0x140 [ 923.606036] futex_hash_free+0x38/0xc0 [ 923.606062] mmput+0x2d3/0x390 [ 923.606097] do_exit+0x79d/0x2970 [ 923.606123] ? lock_release+0xc8/0x290 [ 923.606155] ? __pfx_do_exit+0x10/0x10 [ 923.606182] ? find_held_lock+0x2b/0x80 [ 923.606214] ? get_signal+0x835/0x2340 [ 923.606252] do_group_exit+0xd3/0x2a0 [ 923.606281] get_signal+0x2315/0x2340 [ 923.606315] ? __pfx_signal_setup_done+0x10/0x10 [ 923.606357] ? __pfx_get_signal+0x10/0x10 [ 923.606388] ? do_futex+0x135/0x370 [ 923.606414] ? __pfx_do_futex+0x10/0x10 [ 923.606437] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 923.606472] arch_do_signal_or_restart+0x80/0x790 [ 923.606505] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 923.606537] ? __x64_sys_futex+0x1c9/0x4d0 [ 923.606560] ? __x64_sys_futex+0x1d2/0x4d0 [ 923.606589] ? __pfx___x64_sys_futex+0x10/0x10 [ 923.606614] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 923.606649] exit_to_user_mode_loop+0x8b/0x110 [ 923.606673] do_syscall_64+0x2f7/0x360 [ 923.606696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 923.606719] RIP: 0033:0x7f61678c2b19 [ 923.606750] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 923.606762] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 923.606791] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 923.606811] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 923.606829] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 923.606844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 923.606858] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 923.606889] [ 923.606896] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 923.606910] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295590324 [ 923.606923] kmemleak: min_count = 1 [ 923.606930] kmemleak: count = 0 [ 923.606937] kmemleak: flags = 0x21 [ 923.606945] kmemleak: checksum = 0 [ 923.606952] kmemleak: backtrace: [ 923.606958] pcpu_alloc_noprof+0x87a/0x1170 [ 923.606987] __percpu_counter_init_many+0x44/0x360 [ 923.607012] mm_init+0xcac/0x1170 [ 923.607027] copy_process+0x3ab7/0x73c0 [ 923.607047] kernel_clone+0xea/0x7f0 [ 923.607066] __do_sys_clone+0xce/0x120 [ 923.607086] do_syscall_64+0xbf/0x360 [ 923.607102] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:57:29 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb2", 0x4e, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:29 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:29 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:57:29 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 923.789219] kmemleak: Found object by alias at 0x607f1a62a61c [ 923.789239] CPU: 1 UID: 0 PID: 8307 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 923.789257] Tainted: [W]=WARN [ 923.789262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 923.789269] Call Trace: [ 923.789273] [ 923.789278] dump_stack_lvl+0xca/0x120 [ 923.789305] __lookup_object+0x94/0xb0 [ 923.789322] delete_object_full+0x27/0x70 [ 923.789338] free_percpu+0x30/0x1160 [ 923.789354] ? arch_uprobe_clear_state+0x16/0x140 [ 923.789374] futex_hash_free+0x38/0xc0 [ 923.789388] mmput+0x2d3/0x390 [ 923.789407] do_exit+0x79d/0x2970 [ 923.789424] ? __pfx_do_exit+0x10/0x10 [ 923.789438] ? find_held_lock+0x2b/0x80 [ 923.789461] ? get_signal+0x835/0x2340 [ 923.789481] do_group_exit+0xd3/0x2a0 [ 923.789496] get_signal+0x2315/0x2340 [ 923.789513] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 923.789530] ? __pfx_get_signal+0x10/0x10 [ 923.789546] ? __schedule+0xe91/0x3590 [ 923.789566] arch_do_signal_or_restart+0x80/0x790 [ 923.789583] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 923.789599] ? __x64_sys_futex+0x1c9/0x4d0 [ 923.789612] ? __x64_sys_futex+0x1d2/0x4d0 [ 923.789626] ? __pfx___x64_sys_futex+0x10/0x10 [ 923.789639] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 923.789657] exit_to_user_mode_loop+0x8b/0x110 [ 923.789670] do_syscall_64+0x2f7/0x360 [ 923.789682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 923.789694] RIP: 0033:0x7f61678c2b19 [ 923.789702] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 923.789708] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 923.789720] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 923.789727] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 923.789734] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 923.789741] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 923.789749] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 923.789764] [ 923.789768] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 923.789775] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295590527 [ 923.789782] kmemleak: min_count = 1 [ 923.789785] kmemleak: count = 0 [ 923.789789] kmemleak: flags = 0x21 [ 923.789793] kmemleak: checksum = 0 [ 923.789796] kmemleak: backtrace: [ 923.789800] pcpu_alloc_noprof+0x87a/0x1170 [ 923.789814] __percpu_counter_init_many+0x44/0x360 [ 923.789828] mm_init+0xcac/0x1170 [ 923.789836] copy_process+0x3ab7/0x73c0 [ 923.789846] kernel_clone+0xea/0x7f0 [ 923.789855] __do_sys_clone+0xce/0x120 [ 923.789865] do_syscall_64+0xbf/0x360 [ 923.789873] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:57:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:57:38 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:38 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x1, &(0x7f0000000800)=[{&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:38 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:38 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:38 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:57:38 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x4c, 0x0) 01:57:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 932.980829] No source specified [ 933.006862] No source specified [ 933.009125] No source specified 01:57:38 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:38 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:57:38 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) [ 933.066039] kmemleak: Found object by alias at 0x607f1a62a618 [ 933.066058] CPU: 1 UID: 0 PID: 8326 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 933.066076] Tainted: [W]=WARN [ 933.066080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 933.066087] Call Trace: [ 933.066091] [ 933.066096] dump_stack_lvl+0xca/0x120 [ 933.066120] __lookup_object+0x94/0xb0 [ 933.066136] delete_object_full+0x27/0x70 [ 933.066152] free_percpu+0x30/0x1160 [ 933.066168] ? arch_uprobe_clear_state+0x16/0x140 [ 933.066188] futex_hash_free+0x38/0xc0 [ 933.066202] mmput+0x2d3/0x390 [ 933.066220] do_exit+0x79d/0x2970 [ 933.066233] ? signal_wake_up_state+0x85/0x120 [ 933.066248] ? zap_other_threads+0x2b9/0x3a0 [ 933.066264] ? __pfx_do_exit+0x10/0x10 [ 933.066280] ? do_group_exit+0x1c3/0x2a0 [ 933.066293] ? lock_release+0xc8/0x290 [ 933.066310] do_group_exit+0xd3/0x2a0 [ 933.066325] __x64_sys_exit_group+0x3e/0x50 [ 933.066338] x64_sys_call+0x18c5/0x18d0 [ 933.066353] do_syscall_64+0xbf/0x360 [ 933.066365] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.066376] RIP: 0033:0x7ff07166db19 [ 933.066384] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 933.066389] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 933.066401] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 933.066408] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 933.066415] RBP: 0000000000000000 R08: 0000001b2cf225a4 R09: 0000000000000000 [ 933.066421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 933.066428] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 933.066443] [ 933.066447] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 933.066453] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295599819 [ 933.066460] kmemleak: min_count = 1 [ 933.066464] kmemleak: count = 0 [ 933.066467] kmemleak: flags = 0x21 [ 933.066471] kmemleak: checksum = 0 [ 933.066475] kmemleak: backtrace: [ 933.066478] pcpu_alloc_noprof+0x87a/0x1170 [ 933.066495] __percpu_counter_init_many+0x44/0x360 [ 933.066511] mm_init+0xcac/0x1170 [ 933.066519] copy_process+0x3ab7/0x73c0 [ 933.066528] kernel_clone+0xea/0x7f0 [ 933.066538] __do_sys_clone+0xce/0x120 [ 933.066548] do_syscall_64+0xbf/0x360 [ 933.066556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.087689] kmemleak: Found object by alias at 0x607f1a62a61c [ 933.087724] CPU: 0 UID: 0 PID: 8320 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 933.087766] Tainted: [W]=WARN [ 933.087773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 933.087786] Call Trace: [ 933.087794] [ 933.087802] dump_stack_lvl+0xca/0x120 [ 933.087846] __lookup_object+0x94/0xb0 [ 933.087877] delete_object_full+0x27/0x70 [ 933.087907] free_percpu+0x30/0x1160 [ 933.087938] ? arch_uprobe_clear_state+0x16/0x140 [ 933.087976] futex_hash_free+0x38/0xc0 [ 933.088002] mmput+0x2d3/0x390 [ 933.088038] do_exit+0x79d/0x2970 [ 933.088063] ? signal_wake_up_state+0x85/0x120 [ 933.088093] ? zap_other_threads+0x2b9/0x3a0 [ 933.088124] ? __pfx_do_exit+0x10/0x10 [ 933.088149] ? do_group_exit+0x1c3/0x2a0 [ 933.088175] ? lock_release+0xc8/0x290 [ 933.088207] do_group_exit+0xd3/0x2a0 [ 933.088236] __x64_sys_exit_group+0x3e/0x50 [ 933.088263] x64_sys_call+0x18c5/0x18d0 [ 933.088292] do_syscall_64+0xbf/0x360 [ 933.088315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.088336] RIP: 0033:0x7f61678c2b19 [ 933.088353] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 933.088363] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 933.088385] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 933.088399] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 933.088413] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 933.088427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 933.088440] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 933.088470] [ 933.088477] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 933.088490] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295599819 [ 933.088504] kmemleak: min_count = 1 [ 933.088511] kmemleak: count = 0 [ 933.088518] kmemleak: flags = 0x21 [ 933.088525] kmemleak: checksum = 0 [ 933.088532] kmemleak: backtrace: [ 933.088539] pcpu_alloc_noprof+0x87a/0x1170 [ 933.088568] __percpu_counter_init_many+0x44/0x360 [ 933.088592] mm_init+0xcac/0x1170 [ 933.088608] copy_process+0x3ab7/0x73c0 [ 933.088627] kernel_clone+0xea/0x7f0 [ 933.088646] __do_sys_clone+0xce/0x120 [ 933.088665] do_syscall_64+0xbf/0x360 [ 933.088682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.156979] No source specified 01:57:38 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:57:38 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:38 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:38 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 933.262092] No source specified [ 933.305215] kmemleak: Found object by alias at 0x607f1a62a61c [ 933.305241] CPU: 1 UID: 0 PID: 8340 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 933.305275] Tainted: [W]=WARN [ 933.305282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 933.305295] Call Trace: [ 933.305302] [ 933.305310] dump_stack_lvl+0xca/0x120 [ 933.305350] __lookup_object+0x94/0xb0 [ 933.305379] delete_object_full+0x27/0x70 [ 933.305408] free_percpu+0x30/0x1160 [ 933.305438] ? arch_uprobe_clear_state+0x16/0x140 [ 933.305483] futex_hash_free+0x38/0xc0 [ 933.305508] mmput+0x2d3/0x390 [ 933.305542] do_exit+0x79d/0x2970 [ 933.305567] ? signal_wake_up_state+0x85/0x120 [ 933.305596] ? zap_other_threads+0x2b9/0x3a0 [ 933.305626] ? __pfx_do_exit+0x10/0x10 [ 933.305649] ? do_group_exit+0x1c3/0x2a0 [ 933.305675] ? lock_release+0xc8/0x290 [ 933.305706] do_group_exit+0xd3/0x2a0 [ 933.305734] __x64_sys_exit_group+0x3e/0x50 [ 933.305760] x64_sys_call+0x18c5/0x18d0 [ 933.305789] do_syscall_64+0xbf/0x360 [ 933.305810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.305831] RIP: 0033:0x7f61678c2b19 [ 933.305847] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 933.305857] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 933.305878] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 933.305892] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 933.305905] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 933.305918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 933.305931] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 933.305960] [ 933.305967] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 933.305980] kmemleak: comm "kworker/u10:9", pid 8349, jiffies 4295600046 [ 933.305992] kmemleak: min_count = 1 [ 933.306000] kmemleak: count = 0 [ 933.306006] kmemleak: flags = 0x21 [ 933.306013] kmemleak: checksum = 0 [ 933.306020] kmemleak: backtrace: [ 933.306027] pcpu_alloc_noprof+0x87a/0x1170 [ 933.306055] __percpu_counter_init_many+0x44/0x360 [ 933.306078] mm_init+0xcac/0x1170 [ 933.306093] mm_alloc+0xa0/0xd0 [ 933.306109] alloc_bprm+0x2e3/0x6e0 [ 933.306139] kernel_execve+0xb0/0x3d0 [ 933.306156] call_usermodehelper_exec_async+0x25f/0x4e0 [ 933.306184] ret_from_fork+0x34b/0x430 [ 933.306215] ret_from_fork_asm+0x1a/0x30 [ 933.346498] kmemleak: Found object by alias at 0x607f1a62a618 [ 933.346527] CPU: 0 UID: 0 PID: 8342 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 933.346559] Tainted: [W]=WARN [ 933.346565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 933.346578] Call Trace: [ 933.346585] [ 933.346593] dump_stack_lvl+0xca/0x120 [ 933.346633] __lookup_object+0x94/0xb0 [ 933.346669] delete_object_full+0x27/0x70 [ 933.346698] free_percpu+0x30/0x1160 [ 933.346728] ? arch_uprobe_clear_state+0x16/0x140 [ 933.346764] futex_hash_free+0x38/0xc0 [ 933.346789] mmput+0x2d3/0x390 [ 933.346823] do_exit+0x79d/0x2970 [ 933.346858] ? signal_wake_up_state+0x85/0x120 [ 933.346886] ? zap_other_threads+0x2b9/0x3a0 [ 933.346915] ? __pfx_do_exit+0x10/0x10 [ 933.346938] ? do_group_exit+0x1c3/0x2a0 [ 933.346963] ? lock_release+0xc8/0x290 [ 933.346994] do_group_exit+0xd3/0x2a0 [ 933.347021] __x64_sys_exit_group+0x3e/0x50 [ 933.347047] x64_sys_call+0x18c5/0x18d0 [ 933.347075] do_syscall_64+0xbf/0x360 [ 933.347096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.347116] RIP: 0033:0x7ff07166db19 [ 933.347132] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 933.347141] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 933.347161] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 933.347174] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 933.347187] RBP: 0000000000000000 R08: 0000001b2cf22628 R09: 0000000000000000 [ 933.347200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 933.347212] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 933.347240] [ 933.347247] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 933.347259] kmemleak: comm "kworker/u10:9", pid 8349, jiffies 4295600046 [ 933.347272] kmemleak: min_count = 1 [ 933.347279] kmemleak: count = 0 [ 933.347285] kmemleak: flags = 0x21 [ 933.347292] kmemleak: checksum = 0 [ 933.347299] kmemleak: backtrace: [ 933.347305] pcpu_alloc_noprof+0x87a/0x1170 [ 933.347333] __percpu_counter_init_many+0x44/0x360 [ 933.347356] mm_init+0xcac/0x1170 [ 933.347370] mm_alloc+0xa0/0xd0 [ 933.347386] alloc_bprm+0x2e3/0x6e0 [ 933.347416] kernel_execve+0xb0/0x3d0 [ 933.347432] call_usermodehelper_exec_async+0x25f/0x4e0 [ 933.347460] ret_from_fork+0x34b/0x430 [ 933.347491] ret_from_fork_asm+0x1a/0x30 01:57:47 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:57:47 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:47 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:47 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:47 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:57:47 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:47 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 942.297419] No source specified [ 942.343967] No source specified 01:57:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 942.372519] kmemleak: Found object by alias at 0x607f1a62a61c [ 942.372539] CPU: 0 UID: 0 PID: 8372 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 942.372558] Tainted: [W]=WARN [ 942.372563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.372570] Call Trace: [ 942.372574] [ 942.372579] dump_stack_lvl+0xca/0x120 [ 942.372609] __lookup_object+0x94/0xb0 [ 942.372627] delete_object_full+0x27/0x70 [ 942.372643] free_percpu+0x30/0x1160 [ 942.372661] ? arch_uprobe_clear_state+0x16/0x140 [ 942.372682] futex_hash_free+0x38/0xc0 [ 942.372697] mmput+0x2d3/0x390 [ 942.372716] do_exit+0x79d/0x2970 [ 942.372731] ? lock_release+0xc8/0x290 [ 942.372749] ? __pfx_do_exit+0x10/0x10 [ 942.372763] ? find_held_lock+0x2b/0x80 [ 942.372781] ? get_signal+0x835/0x2340 [ 942.372802] do_group_exit+0xd3/0x2a0 [ 942.372818] get_signal+0x2315/0x2340 [ 942.372836] ? __pfx_signal_setup_done+0x10/0x10 [ 942.372858] ? __pfx_get_signal+0x10/0x10 [ 942.372875] ? do_futex+0x135/0x370 [ 942.372889] ? __pfx_do_futex+0x10/0x10 [ 942.372901] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 942.372917] arch_do_signal_or_restart+0x80/0x790 [ 942.372936] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 942.372953] ? __x64_sys_futex+0x1c9/0x4d0 [ 942.372966] ? __x64_sys_futex+0x1d2/0x4d0 [ 942.372981] ? __pfx___x64_sys_futex+0x10/0x10 [ 942.372994] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 942.373014] exit_to_user_mode_loop+0x8b/0x110 [ 942.373027] do_syscall_64+0x2f7/0x360 [ 942.373040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.373053] RIP: 0033:0x7f61678c2b19 [ 942.373063] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 942.373068] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 942.373080] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 942.373088] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 942.373095] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 942.373103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 942.373110] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 942.373127] [ 942.373131] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 942.373138] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295609029 [ 942.373145] kmemleak: min_count = 1 [ 942.373149] kmemleak: count = 0 [ 942.373153] kmemleak: flags = 0x21 [ 942.373157] kmemleak: checksum = 0 [ 942.373161] kmemleak: backtrace: [ 942.373165] pcpu_alloc_noprof+0x87a/0x1170 [ 942.373180] __percpu_counter_init_many+0x44/0x360 [ 942.373194] mm_init+0xcac/0x1170 [ 942.373202] copy_process+0x3ab7/0x73c0 [ 942.373213] kernel_clone+0xea/0x7f0 [ 942.373223] __do_sys_clone+0xce/0x120 [ 942.373233] do_syscall_64+0xbf/0x360 [ 942.373242] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.442282] kmemleak: Found object by alias at 0x607f1a62a618 [ 942.442311] CPU: 1 UID: 0 PID: 8377 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 942.442343] Tainted: [W]=WARN [ 942.442350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.442362] Call Trace: [ 942.442369] [ 942.442377] dump_stack_lvl+0xca/0x120 [ 942.442416] __lookup_object+0x94/0xb0 [ 942.442444] delete_object_full+0x27/0x70 [ 942.442481] free_percpu+0x30/0x1160 [ 942.442509] ? arch_uprobe_clear_state+0x16/0x140 [ 942.442544] futex_hash_free+0x38/0xc0 [ 942.442568] mmput+0x2d3/0x390 [ 942.442601] do_exit+0x79d/0x2970 [ 942.442624] ? lock_release+0xc8/0x290 [ 942.442653] ? __pfx_do_exit+0x10/0x10 [ 942.442678] ? find_held_lock+0x2b/0x80 [ 942.442709] ? get_signal+0x835/0x2340 [ 942.442743] do_group_exit+0xd3/0x2a0 [ 942.442770] get_signal+0x2315/0x2340 [ 942.442811] ? __pfx_get_signal+0x10/0x10 [ 942.442840] ? do_futex+0x135/0x370 [ 942.442864] ? __pfx_do_futex+0x10/0x10 [ 942.442885] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 942.442911] arch_do_signal_or_restart+0x80/0x790 [ 942.442956] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 942.442985] ? __x64_sys_futex+0x1c9/0x4d0 [ 942.443007] ? __x64_sys_futex+0x1d2/0x4d0 [ 942.443034] ? __pfx___x64_sys_futex+0x10/0x10 [ 942.443058] ? xfd_validate_state+0x55/0x180 [ 942.443086] ? __pfx___x64_sys_mount+0x10/0x10 [ 942.443116] exit_to_user_mode_loop+0x8b/0x110 [ 942.443139] do_syscall_64+0x2f7/0x360 [ 942.443160] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.443180] RIP: 0033:0x7ff07166db19 [ 942.443196] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 942.443205] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 942.443225] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 942.443239] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 942.443251] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 942.443263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 942.443276] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 942.443304] [ 942.443311] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 942.443323] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295609029 [ 942.443335] kmemleak: min_count = 1 [ 942.443342] kmemleak: count = 0 [ 942.443349] kmemleak: flags = 0x21 [ 942.443356] kmemleak: checksum = 0 [ 942.443362] kmemleak: backtrace: [ 942.443368] pcpu_alloc_noprof+0x87a/0x1170 [ 942.443395] __percpu_counter_init_many+0x44/0x360 [ 942.443417] mm_init+0xcac/0x1170 [ 942.443431] copy_process+0x3ab7/0x73c0 [ 942.443449] kernel_clone+0xea/0x7f0 [ 942.443466] __do_sys_clone+0xce/0x120 [ 942.443485] do_syscall_64+0xbf/0x360 [ 942.443500] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:57:47 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:57:47 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:47 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:47 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:57:47 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 942.547575] kmemleak: Found object by alias at 0x607f1a62a61c [ 942.547594] CPU: 0 UID: 0 PID: 8382 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 942.547612] Tainted: [W]=WARN [ 942.547615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.547623] Call Trace: [ 942.547627] [ 942.547631] dump_stack_lvl+0xca/0x120 [ 942.547659] __lookup_object+0x94/0xb0 [ 942.547682] delete_object_full+0x27/0x70 [ 942.547698] free_percpu+0x30/0x1160 [ 942.547715] ? arch_uprobe_clear_state+0x16/0x140 [ 942.547734] futex_hash_free+0x38/0xc0 [ 942.547749] mmput+0x2d3/0x390 [ 942.547767] do_exit+0x79d/0x2970 [ 942.547785] ? __pfx_do_exit+0x10/0x10 [ 942.547798] ? find_held_lock+0x2b/0x80 [ 942.547816] ? get_signal+0x835/0x2340 [ 942.547836] do_group_exit+0xd3/0x2a0 [ 942.547850] get_signal+0x2315/0x2340 [ 942.547867] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 942.547884] ? __pfx_get_signal+0x10/0x10 [ 942.547900] ? do_futex+0x135/0x370 [ 942.547914] ? __pfx_do_futex+0x10/0x10 [ 942.547928] arch_do_signal_or_restart+0x80/0x790 [ 942.547946] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 942.547962] ? __x64_sys_futex+0x1c9/0x4d0 [ 942.547974] ? __x64_sys_futex+0x1d2/0x4d0 [ 942.547988] ? __pfx___x64_sys_futex+0x10/0x10 [ 942.548001] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 942.548014] ? xfd_validate_state+0x55/0x180 [ 942.548035] exit_to_user_mode_loop+0x8b/0x110 [ 942.548048] do_syscall_64+0x2f7/0x360 [ 942.548060] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.548072] RIP: 0033:0x7f61678c2b19 [ 942.548081] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 942.548086] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 942.548097] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 942.548105] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 942.548112] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 942.548119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 942.548126] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 942.548141] [ 942.548145] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 942.548152] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295609309 [ 942.548158] kmemleak: min_count = 1 [ 942.548162] kmemleak: count = 0 [ 942.548166] kmemleak: flags = 0x21 [ 942.548169] kmemleak: checksum = 0 [ 942.548173] kmemleak: backtrace: [ 942.548176] pcpu_alloc_noprof+0x87a/0x1170 [ 942.548191] __percpu_counter_init_many+0x44/0x360 [ 942.548204] mm_init+0xcac/0x1170 [ 942.548212] copy_process+0x3ab7/0x73c0 [ 942.548222] kernel_clone+0xea/0x7f0 [ 942.548231] __do_sys_clone+0xce/0x120 [ 942.548241] do_syscall_64+0xbf/0x360 [ 942.548250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.616415] No source specified 01:57:56 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:57:56 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 01:57:56 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:57:56 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:56 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:56 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:56 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:56 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:56 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[], [{@appraise}]}) 01:57:56 executing program 6: socket(0x25, 0x800, 0x515a) 01:57:56 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 951.502491] kmemleak: Found object by alias at 0x607f1a62a61c [ 951.502522] CPU: 0 UID: 0 PID: 8416 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 951.502562] Tainted: [W]=WARN [ 951.502570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.502583] Call Trace: [ 951.502590] [ 951.502598] dump_stack_lvl+0xca/0x120 [ 951.502639] __lookup_object+0x94/0xb0 [ 951.502669] delete_object_full+0x27/0x70 [ 951.502700] free_percpu+0x30/0x1160 [ 951.502730] ? arch_uprobe_clear_state+0x16/0x140 [ 951.502768] futex_hash_free+0x38/0xc0 [ 951.502793] mmput+0x2d3/0x390 [ 951.502828] do_exit+0x79d/0x2970 [ 951.502854] ? lock_release+0xc8/0x290 [ 951.502885] ? __pfx_do_exit+0x10/0x10 [ 951.502912] ? find_held_lock+0x2b/0x80 [ 951.502944] ? get_signal+0x835/0x2340 [ 951.502982] do_group_exit+0xd3/0x2a0 [ 951.503011] get_signal+0x2315/0x2340 [ 951.503057] ? __pfx_signal_setup_done+0x10/0x10 [ 951.503098] ? __pfx_get_signal+0x10/0x10 [ 951.503129] ? do_futex+0x135/0x370 01:57:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 951.503155] ? __pfx_do_futex+0x10/0x10 [ 951.503178] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 951.503206] arch_do_signal_or_restart+0x80/0x790 [ 951.503238] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 951.503270] ? __x64_sys_futex+0x1c9/0x4d0 [ 951.503293] ? __x64_sys_futex+0x1d2/0x4d0 [ 951.503322] ? __pfx___x64_sys_futex+0x10/0x10 [ 951.503347] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 951.503382] exit_to_user_mode_loop+0x8b/0x110 [ 951.503406] do_syscall_64+0x2f7/0x360 [ 951.503429] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.503451] RIP: 0033:0x7f61678c2b19 [ 951.503468] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 951.503478] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 951.503499] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 951.503514] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 951.503528] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 951.503541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 951.503554] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 951.503585] [ 951.503592] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 951.503605] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295618242 [ 951.503619] kmemleak: min_count = 1 [ 951.503626] kmemleak: count = 0 [ 951.503633] kmemleak: flags = 0x21 [ 951.503641] kmemleak: checksum = 0 [ 951.503648] kmemleak: backtrace: [ 951.503654] pcpu_alloc_noprof+0x87a/0x1170 [ 951.503683] __percpu_counter_init_many+0x44/0x360 [ 951.503706] mm_init+0xcac/0x1170 [ 951.503722] copy_process+0x3ab7/0x73c0 [ 951.503741] kernel_clone+0xea/0x7f0 [ 951.503760] __do_sys_clone+0xce/0x120 [ 951.503780] do_syscall_64+0xbf/0x360 [ 951.503796] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:57:57 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:57:57 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="d4", 0x1}], 0x3800020, 0x0) 01:57:57 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:57:57 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:57 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:57:57 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f", 0x34, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 951.689318] kmemleak: Found object by alias at 0x607f1a62a618 [ 951.689345] CPU: 0 UID: 0 PID: 8432 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 951.689380] Tainted: [W]=WARN [ 951.689387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.689399] Call Trace: [ 951.689406] [ 951.689415] dump_stack_lvl+0xca/0x120 [ 951.689462] __lookup_object+0x94/0xb0 [ 951.689492] delete_object_full+0x27/0x70 [ 951.689523] free_percpu+0x30/0x1160 [ 951.689553] ? arch_uprobe_clear_state+0x16/0x140 [ 951.689590] futex_hash_free+0x38/0xc0 [ 951.689616] mmput+0x2d3/0x390 [ 951.689651] do_exit+0x79d/0x2970 [ 951.689677] ? lock_release+0xc8/0x290 [ 951.689708] ? __pfx_do_exit+0x10/0x10 [ 951.689735] ? find_held_lock+0x2b/0x80 [ 951.689767] ? get_signal+0x835/0x2340 [ 951.689805] do_group_exit+0xd3/0x2a0 [ 951.689834] get_signal+0x2315/0x2340 [ 951.689878] ? __pfx_get_signal+0x10/0x10 [ 951.689909] ? do_futex+0x135/0x370 [ 951.689936] ? __pfx_do_futex+0x10/0x10 [ 951.689965] arch_do_signal_or_restart+0x80/0x790 [ 951.689998] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 951.690029] ? __x64_sys_futex+0x1c9/0x4d0 [ 951.690053] ? __x64_sys_futex+0x1d2/0x4d0 [ 951.690079] ? exc_page_fault+0xb0/0x180 [ 951.690110] ? __pfx___x64_sys_futex+0x10/0x10 [ 951.690146] exit_to_user_mode_loop+0x8b/0x110 [ 951.690170] do_syscall_64+0x2f7/0x360 [ 951.690192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.690215] RIP: 0033:0x7ff07166db19 [ 951.690231] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 951.690241] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 951.690262] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 951.690277] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 951.690290] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 951.690303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 951.690317] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 951.690348] [ 951.690355] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 951.690368] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295618434 [ 951.690381] kmemleak: min_count = 1 [ 951.690389] kmemleak: count = 0 [ 951.690396] kmemleak: flags = 0x21 [ 951.690403] kmemleak: checksum = 0 [ 951.690410] kmemleak: backtrace: [ 951.690416] pcpu_alloc_noprof+0x87a/0x1170 [ 951.690445] __percpu_counter_init_many+0x44/0x360 [ 951.690470] mm_init+0xcac/0x1170 [ 951.690485] copy_process+0x3ab7/0x73c0 [ 951.690505] kernel_clone+0xea/0x7f0 [ 951.690524] __do_sys_clone+0xce/0x120 [ 951.690543] do_syscall_64+0xbf/0x360 [ 951.690560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.817179] kmemleak: Found object by alias at 0x607f1a62a61c [ 951.817209] CPU: 0 UID: 0 PID: 8439 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 951.817243] Tainted: [W]=WARN [ 951.817250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.817263] Call Trace: [ 951.817270] [ 951.817279] dump_stack_lvl+0xca/0x120 [ 951.817319] __lookup_object+0x94/0xb0 [ 951.817349] delete_object_full+0x27/0x70 [ 951.817380] free_percpu+0x30/0x1160 [ 951.817411] ? arch_uprobe_clear_state+0x16/0x140 [ 951.817456] futex_hash_free+0x38/0xc0 [ 951.817481] mmput+0x2d3/0x390 [ 951.817517] do_exit+0x79d/0x2970 [ 951.817542] ? lock_release+0xc8/0x290 [ 951.817573] ? __pfx_do_exit+0x10/0x10 [ 951.817600] ? find_held_lock+0x2b/0x80 [ 951.817633] ? get_signal+0x835/0x2340 [ 951.817670] do_group_exit+0xd3/0x2a0 [ 951.817698] get_signal+0x2315/0x2340 [ 951.817733] ? __pfx_signal_setup_done+0x10/0x10 [ 951.817773] ? __pfx_get_signal+0x10/0x10 [ 951.817805] ? do_futex+0x135/0x370 [ 951.817831] ? __pfx_do_futex+0x10/0x10 [ 951.817854] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 951.817881] arch_do_signal_or_restart+0x80/0x790 [ 951.817914] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 951.817945] ? __x64_sys_futex+0x1c9/0x4d0 [ 951.817968] ? __x64_sys_futex+0x1d2/0x4d0 [ 951.817997] ? __pfx___x64_sys_futex+0x10/0x10 [ 951.818021] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 951.818057] exit_to_user_mode_loop+0x8b/0x110 [ 951.818080] do_syscall_64+0x2f7/0x360 [ 951.818103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.818125] RIP: 0033:0x7f61678c2b19 [ 951.818142] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 951.818152] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 951.818174] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 951.818188] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 951.818202] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 951.818215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 951.818229] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 951.818259] [ 951.818266] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 951.818279] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295618434 [ 951.818293] kmemleak: min_count = 1 [ 951.818300] kmemleak: count = 0 [ 951.818307] kmemleak: flags = 0x21 [ 951.818314] kmemleak: checksum = 0 [ 951.818322] kmemleak: backtrace: [ 951.818328] pcpu_alloc_noprof+0x87a/0x1170 [ 951.818356] __percpu_counter_init_many+0x44/0x360 [ 951.818380] mm_init+0xcac/0x1170 [ 951.818396] copy_process+0x3ab7/0x73c0 [ 951.818415] kernel_clone+0xea/0x7f0 [ 951.818434] __do_sys_clone+0xce/0x120 [ 951.818453] do_syscall_64+0xbf/0x360 [ 951.818470] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:06 executing program 6: socket(0x0, 0x800, 0x515a) 01:58:06 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:06 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x6c, 0x0) 01:58:06 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:06 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:58:06 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}, {&(0x7f0000000780)="d4", 0x1}], 0x0, 0x0) [ 960.889162] No source specified 01:58:06 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) [ 960.909088] kmemleak: Found object by alias at 0x607f1a62a61c [ 960.909106] CPU: 1 UID: 0 PID: 8454 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 960.909127] Tainted: [W]=WARN [ 960.909132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.909140] Call Trace: [ 960.909144] [ 960.909149] dump_stack_lvl+0xca/0x120 [ 960.909178] __lookup_object+0x94/0xb0 [ 960.909197] delete_object_full+0x27/0x70 [ 960.909216] free_percpu+0x30/0x1160 [ 960.909234] ? arch_uprobe_clear_state+0x16/0x140 [ 960.909256] futex_hash_free+0x38/0xc0 [ 960.909272] mmput+0x2d3/0x390 [ 960.909293] do_exit+0x79d/0x2970 [ 960.909308] ? signal_wake_up_state+0x85/0x120 [ 960.909326] ? zap_other_threads+0x2b9/0x3a0 [ 960.909344] ? __pfx_do_exit+0x10/0x10 [ 960.909358] ? do_group_exit+0x1c3/0x2a0 [ 960.909373] ? lock_release+0xc8/0x290 [ 960.909392] do_group_exit+0xd3/0x2a0 [ 960.909409] __x64_sys_exit_group+0x3e/0x50 [ 960.909424] x64_sys_call+0x18c5/0x18d0 [ 960.909442] do_syscall_64+0xbf/0x360 [ 960.909459] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 960.909472] RIP: 0033:0x7f61678c2b19 [ 960.909482] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 960.909488] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 960.909501] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 960.909509] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 960.909518] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 960.909525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 960.909533] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 960.909551] [ 960.909555] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 960.909563] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295627601 [ 960.909571] kmemleak: min_count = 1 [ 960.909576] kmemleak: count = 0 [ 960.909580] kmemleak: flags = 0x21 [ 960.909584] kmemleak: checksum = 0 [ 960.909589] kmemleak: backtrace: [ 960.909593] pcpu_alloc_noprof+0x87a/0x1170 [ 960.909610] __percpu_counter_init_many+0x44/0x360 [ 960.909625] mm_init+0xcac/0x1170 [ 960.909634] copy_process+0x3ab7/0x73c0 [ 960.909645] kernel_clone+0xea/0x7f0 [ 960.909656] __do_sys_clone+0xce/0x120 [ 960.909668] do_syscall_64+0xbf/0x360 [ 960.909677] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 960.965738] kmemleak: Found object by alias at 0x607f1a62a618 [ 960.965755] CPU: 1 UID: 0 PID: 8465 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 960.965774] Tainted: [W]=WARN [ 960.965778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.965786] Call Trace: [ 960.965790] [ 960.965795] dump_stack_lvl+0xca/0x120 [ 960.965823] __lookup_object+0x94/0xb0 [ 960.965841] delete_object_full+0x27/0x70 [ 960.965858] free_percpu+0x30/0x1160 [ 960.965875] ? arch_uprobe_clear_state+0x16/0x140 [ 960.965896] futex_hash_free+0x38/0xc0 [ 960.965912] mmput+0x2d3/0x390 [ 960.965931] do_exit+0x79d/0x2970 [ 960.965946] ? lock_release+0xc8/0x290 [ 960.965963] ? __pfx_do_exit+0x10/0x10 [ 960.965978] ? find_held_lock+0x2b/0x80 [ 960.965997] ? get_signal+0x835/0x2340 [ 960.966018] do_group_exit+0xd3/0x2a0 [ 960.966034] get_signal+0x2315/0x2340 [ 960.966058] ? __pfx_get_signal+0x10/0x10 [ 960.966076] ? do_futex+0x135/0x370 [ 960.966091] ? __pfx_do_futex+0x10/0x10 [ 960.966107] arch_do_signal_or_restart+0x80/0x790 [ 960.966126] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 960.966144] ? __x64_sys_futex+0x1c9/0x4d0 [ 960.966157] ? __x64_sys_futex+0x1d2/0x4d0 [ 960.966171] ? exc_page_fault+0xb0/0x180 [ 960.966190] ? __pfx___x64_sys_futex+0x10/0x10 [ 960.966210] exit_to_user_mode_loop+0x8b/0x110 [ 960.966224] do_syscall_64+0x2f7/0x360 [ 960.966237] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 960.966250] RIP: 0033:0x7ff07166db19 [ 960.966259] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 960.966265] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 960.966277] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 960.966285] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 960.966293] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 960.966300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 960.966308] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 960.966325] [ 960.966329] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 960.966337] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295627601 [ 960.966344] kmemleak: min_count = 1 [ 960.966348] kmemleak: count = 0 [ 960.966352] kmemleak: flags = 0x21 [ 960.966356] kmemleak: checksum = 0 [ 960.966360] kmemleak: backtrace: [ 960.966364] pcpu_alloc_noprof+0x87a/0x1170 [ 960.966380] __percpu_counter_init_many+0x44/0x360 [ 960.966393] mm_init+0xcac/0x1170 [ 960.966402] copy_process+0x3ab7/0x73c0 [ 960.966413] kernel_clone+0xea/0x7f0 [ 960.966423] __do_sys_clone+0xce/0x120 [ 960.966434] do_syscall_64+0xbf/0x360 [ 960.966448] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:06 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 961.066380] No source specified 01:58:15 executing program 6: socket(0x0, 0x800, 0x515a) 01:58:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:58:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:58:15 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {0x0, 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 01:58:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:58:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 969.977320] kmemleak: Found object by alias at 0x607f1a62a618 01:58:15 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {0x0, 0x0, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 6: socket(0x0, 0x800, 0x515a) [ 969.977352] CPU: 1 UID: 0 PID: 8498 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 969.977385] Tainted: [W]=WARN [ 969.977392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 969.977404] Call Trace: [ 969.977411] [ 969.977419] dump_stack_lvl+0xca/0x120 [ 969.977467] __lookup_object+0x94/0xb0 [ 969.977495] delete_object_full+0x27/0x70 [ 969.977524] free_percpu+0x30/0x1160 [ 969.977553] ? arch_uprobe_clear_state+0x16/0x140 [ 969.977588] futex_hash_free+0x38/0xc0 [ 969.977613] mmput+0x2d3/0x390 01:58:15 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 969.977646] do_exit+0x79d/0x2970 [ 969.977670] ? lock_release+0xc8/0x290 [ 969.977700] ? __pfx_do_exit+0x10/0x10 [ 969.977725] ? find_held_lock+0x2b/0x80 [ 969.977756] ? get_signal+0x835/0x2340 [ 969.977792] do_group_exit+0xd3/0x2a0 [ 969.977819] get_signal+0x2315/0x2340 [ 969.977861] ? __pfx_get_signal+0x10/0x10 [ 969.977890] ? do_futex+0x135/0x370 [ 969.977915] ? __pfx_do_futex+0x10/0x10 [ 969.977937] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 969.977962] arch_do_signal_or_restart+0x80/0x790 [ 969.977993] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 969.978023] ? __x64_sys_futex+0x1c9/0x4d0 [ 969.978045] ? __x64_sys_futex+0x1d2/0x4d0 [ 969.978072] ? __pfx___x64_sys_futex+0x10/0x10 [ 969.978095] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 969.978118] ? xfd_validate_state+0x55/0x180 [ 969.978156] exit_to_user_mode_loop+0x8b/0x110 [ 969.978178] do_syscall_64+0x2f7/0x360 [ 969.978199] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 969.978220] RIP: 0033:0x7ff07166db19 [ 969.978235] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 969.978245] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 969.978265] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 969.978279] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 969.978291] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 969.978303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 969.978316] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 969.978344] [ 969.978351] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 969.978363] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295636747 [ 969.978375] kmemleak: min_count = 1 [ 969.978382] kmemleak: count = 0 [ 969.978388] kmemleak: flags = 0x21 [ 969.978395] kmemleak: checksum = 0 [ 969.978402] kmemleak: backtrace: [ 969.978407] pcpu_alloc_noprof+0x87a/0x1170 [ 969.978435] __percpu_counter_init_many+0x44/0x360 [ 969.978457] mm_init+0xcac/0x1170 [ 969.978472] copy_process+0x3ab7/0x73c0 [ 969.978490] kernel_clone+0xea/0x7f0 [ 969.978507] __do_sys_clone+0xce/0x120 [ 969.978526] do_syscall_64+0xbf/0x360 [ 969.978541] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 970.056506] kmemleak: Found object by alias at 0x607f1a62a61c [ 970.056524] CPU: 0 UID: 0 PID: 8503 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 970.056542] Tainted: [W]=WARN [ 970.056546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.056553] Call Trace: [ 970.056558] [ 970.056563] dump_stack_lvl+0xca/0x120 [ 970.056591] __lookup_object+0x94/0xb0 [ 970.056608] delete_object_full+0x27/0x70 [ 970.056624] free_percpu+0x30/0x1160 [ 970.056645] ? arch_uprobe_clear_state+0x16/0x140 [ 970.056664] futex_hash_free+0x38/0xc0 [ 970.056679] mmput+0x2d3/0x390 [ 970.056698] do_exit+0x79d/0x2970 [ 970.056711] ? lock_release+0xc8/0x290 [ 970.056728] ? __pfx_do_exit+0x10/0x10 [ 970.056742] ? find_held_lock+0x2b/0x80 [ 970.056759] ? get_signal+0x835/0x2340 [ 970.056779] do_group_exit+0xd3/0x2a0 [ 970.056793] get_signal+0x2315/0x2340 [ 970.056811] ? __pfx_signal_setup_done+0x10/0x10 [ 970.056832] ? __pfx_get_signal+0x10/0x10 [ 970.056848] ? do_futex+0x135/0x370 [ 970.056861] ? __pfx_do_futex+0x10/0x10 [ 970.056872] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 970.056888] arch_do_signal_or_restart+0x80/0x790 [ 970.056905] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 970.056921] ? __x64_sys_futex+0x1c9/0x4d0 [ 970.056933] ? __x64_sys_futex+0x1d2/0x4d0 [ 970.056947] ? __pfx___x64_sys_futex+0x10/0x10 [ 970.056959] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 970.056978] exit_to_user_mode_loop+0x8b/0x110 [ 970.056990] do_syscall_64+0x2f7/0x360 [ 970.057002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 970.057014] RIP: 0033:0x7f61678c2b19 [ 970.057023] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 970.057028] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 970.057039] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 970.057047] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 970.057054] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 970.057061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 970.057068] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 970.057084] [ 970.057088] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 970.057095] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295636747 [ 970.057102] kmemleak: min_count = 1 [ 970.057106] kmemleak: count = 0 [ 970.057110] kmemleak: flags = 0x21 [ 970.057114] kmemleak: checksum = 0 [ 970.057117] kmemleak: backtrace: [ 970.057121] pcpu_alloc_noprof+0x87a/0x1170 [ 970.057135] __percpu_counter_init_many+0x44/0x360 [ 970.057149] mm_init+0xcac/0x1170 [ 970.057157] copy_process+0x3ab7/0x73c0 [ 970.057167] kernel_clone+0xea/0x7f0 [ 970.057176] __do_sys_clone+0xce/0x120 [ 970.057186] do_syscall_64+0xbf/0x360 [ 970.057195] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:15 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:15 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:15 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:58:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa", 0x19, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 970.214427] kmemleak: Found object by alias at 0x607f1a62a618 [ 970.214451] CPU: 0 UID: 0 PID: 8522 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 970.214469] Tainted: [W]=WARN [ 970.214472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.214480] Call Trace: [ 970.214484] [ 970.214488] dump_stack_lvl+0xca/0x120 [ 970.214515] __lookup_object+0x94/0xb0 [ 970.214532] delete_object_full+0x27/0x70 [ 970.214548] free_percpu+0x30/0x1160 [ 970.214564] ? arch_uprobe_clear_state+0x16/0x140 [ 970.214584] futex_hash_free+0x38/0xc0 [ 970.214599] mmput+0x2d3/0x390 [ 970.214617] do_exit+0x79d/0x2970 [ 970.214635] ? __pfx_do_exit+0x10/0x10 [ 970.214648] ? find_held_lock+0x2b/0x80 [ 970.214666] ? get_signal+0x835/0x2340 [ 970.214686] do_group_exit+0xd3/0x2a0 [ 970.214701] get_signal+0x2315/0x2340 [ 970.214717] ? put_task_stack+0xd2/0x240 [ 970.214732] ? __pfx_get_signal+0x10/0x10 [ 970.214748] ? __schedule+0xe91/0x3590 [ 970.214768] arch_do_signal_or_restart+0x80/0x790 [ 970.214786] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 970.214802] ? __x64_sys_futex+0x1c9/0x4d0 [ 970.214814] ? __x64_sys_futex+0x1d2/0x4d0 [ 970.214829] ? __pfx___x64_sys_futex+0x10/0x10 [ 970.214841] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 970.214854] ? xfd_validate_state+0x55/0x180 [ 970.214875] exit_to_user_mode_loop+0x8b/0x110 [ 970.214888] do_syscall_64+0x2f7/0x360 [ 970.214900] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 970.214912] RIP: 0033:0x7ff07166db19 [ 970.214921] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 970.214926] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 970.214938] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 970.214945] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 970.214952] RBP: 00007ff071780f60 R08: 0000000000000002 R09: 0000000000000000 [ 970.214959] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 970.214967] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 970.214983] [ 970.214986] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 970.214993] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295636972 [ 970.215000] kmemleak: min_count = 1 [ 970.215004] kmemleak: count = 0 [ 970.215008] kmemleak: flags = 0x21 [ 970.215011] kmemleak: checksum = 0 [ 970.215015] kmemleak: backtrace: [ 970.215019] pcpu_alloc_noprof+0x87a/0x1170 [ 970.215033] __percpu_counter_init_many+0x44/0x360 [ 970.215046] mm_init+0xcac/0x1170 [ 970.215054] copy_process+0x3ab7/0x73c0 [ 970.215064] kernel_clone+0xea/0x7f0 [ 970.215073] __do_sys_clone+0xce/0x120 [ 970.215083] do_syscall_64+0xbf/0x360 [ 970.215092] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:24 executing program 0: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:24 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:58:24 executing program 6: socket(0x25, 0x0, 0x515a) 01:58:24 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:58:24 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:24 executing program 7: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:58:24 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:24 executing program 6: socket(0x25, 0x0, 0x0) 01:58:24 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:24 executing program 0: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 979.310789] kmemleak: Found object by alias at 0x607f1a62a618 [ 979.310808] CPU: 0 UID: 0 PID: 8545 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 979.310827] Tainted: [W]=WARN [ 979.310830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 979.310837] Call Trace: [ 979.310842] [ 979.310846] dump_stack_lvl+0xca/0x120 [ 979.310871] __lookup_object+0x94/0xb0 [ 979.310888] delete_object_full+0x27/0x70 [ 979.310904] free_percpu+0x30/0x1160 [ 979.310920] ? arch_uprobe_clear_state+0x16/0x140 [ 979.310940] futex_hash_free+0x38/0xc0 [ 979.310954] mmput+0x2d3/0x390 [ 979.310973] do_exit+0x79d/0x2970 [ 979.310987] ? signal_wake_up_state+0x85/0x120 [ 979.311004] ? zap_other_threads+0x2b9/0x3a0 [ 979.311019] ? __pfx_do_exit+0x10/0x10 [ 979.311032] ? do_group_exit+0x1c3/0x2a0 [ 979.311045] ? lock_release+0xc8/0x290 [ 979.311062] do_group_exit+0xd3/0x2a0 [ 979.311077] __x64_sys_exit_group+0x3e/0x50 [ 979.311090] x64_sys_call+0x18c5/0x18d0 [ 979.311106] do_syscall_64+0xbf/0x360 [ 979.311120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 979.311133] RIP: 0033:0x7ff07166db19 [ 979.311143] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 979.311148] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 979.311159] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 979.311167] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 979.311174] RBP: 0000000000000000 R08: 0000001b2cf20ddc R09: 0000000000000000 [ 979.311180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.311187] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 979.311202] [ 979.311205] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 979.311212] kmemleak: comm "kworker/u10:6", pid 8552, jiffies 4295646075 [ 979.311219] kmemleak: min_count = 1 [ 979.311223] kmemleak: count = 0 [ 979.311226] kmemleak: flags = 0x21 [ 979.311230] kmemleak: checksum = 0 [ 979.311233] kmemleak: backtrace: [ 979.311237] pcpu_alloc_noprof+0x87a/0x1170 [ 979.311252] __percpu_counter_init_many+0x44/0x360 [ 979.311265] mm_init+0xcac/0x1170 [ 979.311273] mm_alloc+0xa0/0xd0 [ 979.311281] alloc_bprm+0x2e3/0x6e0 [ 979.311297] kernel_execve+0xb0/0x3d0 [ 979.311306] call_usermodehelper_exec_async+0x25f/0x4e0 [ 979.311321] ret_from_fork+0x34b/0x430 [ 979.311338] ret_from_fork_asm+0x1a/0x30 01:58:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:24 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) 01:58:24 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:33 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:33 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:33 executing program 0: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:33 executing program 2: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:58:33 executing program 7: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 01:58:33 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x3800020, 0x0) [ 988.014801] kmemleak: Found object by alias at 0x607f1a62a61c [ 988.014820] CPU: 1 UID: 0 PID: 8580 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 988.014838] Tainted: [W]=WARN [ 988.014842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.014849] Call Trace: [ 988.014853] [ 988.014858] dump_stack_lvl+0xca/0x120 [ 988.014884] __lookup_object+0x94/0xb0 [ 988.014902] delete_object_full+0x27/0x70 [ 988.014917] free_percpu+0x30/0x1160 [ 988.014934] ? arch_uprobe_clear_state+0x16/0x140 [ 988.014953] futex_hash_free+0x38/0xc0 [ 988.014967] mmput+0x2d3/0x390 [ 988.014986] do_exit+0x79d/0x2970 [ 988.015003] ? __pfx_do_exit+0x10/0x10 [ 988.015017] ? find_held_lock+0x2b/0x80 [ 988.015034] ? get_signal+0x835/0x2340 [ 988.015054] do_group_exit+0xd3/0x2a0 [ 988.015068] get_signal+0x2315/0x2340 [ 988.015085] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 988.015102] ? __pfx_get_signal+0x10/0x10 [ 988.015118] ? __schedule+0xe91/0x3590 [ 988.015141] arch_do_signal_or_restart+0x80/0x790 [ 988.015159] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 988.015175] ? __x64_sys_futex+0x1c9/0x4d0 [ 988.015187] ? __x64_sys_futex+0x1d2/0x4d0 [ 988.015202] ? __pfx___x64_sys_futex+0x10/0x10 [ 988.015214] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 988.015232] exit_to_user_mode_loop+0x8b/0x110 [ 988.015245] do_syscall_64+0x2f7/0x360 [ 988.015257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.015269] RIP: 0033:0x7f61678c2b19 [ 988.015278] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 988.015283] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 988.015294] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 988.015302] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 988.015309] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 988.015316] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 988.015323] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 988.015339] [ 988.015343] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 988.015349] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295654737 [ 988.015356] kmemleak: min_count = 1 [ 988.015360] kmemleak: count = 0 [ 988.015364] kmemleak: flags = 0x21 [ 988.015367] kmemleak: checksum = 0 [ 988.015371] kmemleak: backtrace: [ 988.015374] pcpu_alloc_noprof+0x87a/0x1170 [ 988.015389] __percpu_counter_init_many+0x44/0x360 [ 988.015402] mm_init+0xcac/0x1170 [ 988.015410] copy_process+0x3ab7/0x73c0 [ 988.015420] kernel_clone+0xea/0x7f0 [ 988.015430] __do_sys_clone+0xce/0x120 [ 988.015440] do_syscall_64+0xbf/0x360 [ 988.015448] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 988.060788] kmemleak: Found object by alias at 0x607f1a62a618 [ 988.060801] CPU: 1 UID: 0 PID: 8583 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 988.060819] Tainted: [W]=WARN [ 988.060823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.060829] Call Trace: [ 988.060832] [ 988.060837] dump_stack_lvl+0xca/0x120 [ 988.060855] __lookup_object+0x94/0xb0 [ 988.060870] delete_object_full+0x27/0x70 [ 988.060886] free_percpu+0x30/0x1160 [ 988.060901] ? arch_uprobe_clear_state+0x16/0x140 [ 988.060919] futex_hash_free+0x38/0xc0 [ 988.060932] mmput+0x2d3/0x390 [ 988.060950] do_exit+0x79d/0x2970 [ 988.060967] ? __pfx_do_exit+0x10/0x10 [ 988.060981] ? find_held_lock+0x2b/0x80 [ 988.060997] ? get_signal+0x835/0x2340 [ 988.061017] do_group_exit+0xd3/0x2a0 [ 988.061031] get_signal+0x2315/0x2340 [ 988.061049] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 988.061065] ? __pfx_get_signal+0x10/0x10 [ 988.061081] ? __schedule+0xe91/0x3590 [ 988.061100] arch_do_signal_or_restart+0x80/0x790 [ 988.061117] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 988.061133] ? __x64_sys_futex+0x1c9/0x4d0 [ 988.061145] ? __x64_sys_futex+0x1d2/0x4d0 [ 988.061160] ? __pfx___x64_sys_futex+0x10/0x10 [ 988.061173] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 988.061185] ? xfd_validate_state+0x55/0x180 [ 988.061206] exit_to_user_mode_loop+0x8b/0x110 [ 988.061219] do_syscall_64+0x2f7/0x360 [ 988.061230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.061241] RIP: 0033:0x7ff07166db19 [ 988.061249] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 988.061255] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 988.061266] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 988.061273] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 988.061280] RBP: 00007ff071780f60 R08: 0000000000000016 R09: 0000000000000000 [ 988.061287] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 988.061294] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 988.061309] [ 988.061313] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 988.061319] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295654737 [ 988.061326] kmemleak: min_count = 1 [ 988.061330] kmemleak: count = 0 [ 988.061334] kmemleak: flags = 0x21 [ 988.061338] kmemleak: checksum = 0 [ 988.061341] kmemleak: backtrace: [ 988.061344] pcpu_alloc_noprof+0x87a/0x1170 [ 988.061359] __percpu_counter_init_many+0x44/0x360 [ 988.061371] mm_init+0xcac/0x1170 [ 988.061379] copy_process+0x3ab7/0x73c0 [ 988.061388] kernel_clone+0xea/0x7f0 [ 988.061398] __do_sys_clone+0xce/0x120 [ 988.061408] do_syscall_64+0xbf/0x360 [ 988.061416] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:33 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa", 0x19, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:33 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:58:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:33 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 988.211582] No source specified [ 988.213036] kmemleak: Found object by alias at 0x607f1a62a61c [ 988.213050] CPU: 1 UID: 0 PID: 8601 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 988.213067] Tainted: [W]=WARN [ 988.213071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.213078] Call Trace: [ 988.213082] [ 988.213086] dump_stack_lvl+0xca/0x120 [ 988.213109] __lookup_object+0x94/0xb0 [ 988.213125] delete_object_full+0x27/0x70 [ 988.213141] free_percpu+0x30/0x1160 [ 988.213157] ? arch_uprobe_clear_state+0x16/0x140 [ 988.213177] futex_hash_free+0x38/0xc0 [ 988.213191] mmput+0x2d3/0x390 [ 988.213209] do_exit+0x79d/0x2970 [ 988.213226] ? __pfx_do_exit+0x10/0x10 [ 988.213240] ? find_held_lock+0x2b/0x80 [ 988.213258] ? get_signal+0x835/0x2340 [ 988.213278] do_group_exit+0xd3/0x2a0 [ 988.213293] get_signal+0x2315/0x2340 [ 988.213310] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 988.213326] ? __pfx_get_signal+0x10/0x10 [ 988.213343] ? __schedule+0xe91/0x3590 [ 988.213362] arch_do_signal_or_restart+0x80/0x790 [ 988.213380] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 988.213396] ? __x64_sys_futex+0x1c9/0x4d0 [ 988.213408] ? __x64_sys_futex+0x1d2/0x4d0 [ 988.213423] ? __pfx___x64_sys_futex+0x10/0x10 [ 988.213436] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 988.213457] exit_to_user_mode_loop+0x8b/0x110 [ 988.213470] do_syscall_64+0x2f7/0x360 [ 988.213482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.213494] RIP: 0033:0x7f61678c2b19 [ 988.213502] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 988.213508] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 988.213518] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 988.213526] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 988.213533] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 988.213541] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 988.213548] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 988.213563] [ 988.213567] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 988.213574] kmemleak: comm "syz-executor.6", pid 286, jiffies 4295654975 [ 988.213581] kmemleak: min_count = 1 [ 988.213585] kmemleak: count = 0 [ 988.213588] kmemleak: flags = 0x21 [ 988.213592] kmemleak: checksum = 0 [ 988.213596] kmemleak: backtrace: [ 988.213599] pcpu_alloc_noprof+0x87a/0x1170 [ 988.213614] __percpu_counter_init_many+0x44/0x360 [ 988.213627] mm_init+0xcac/0x1170 [ 988.213635] copy_process+0x3ab7/0x73c0 [ 988.213645] kernel_clone+0xea/0x7f0 [ 988.213654] __do_sys_clone+0xce/0x120 [ 988.213664] do_syscall_64+0xbf/0x360 [ 988.213672] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:41 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:41 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:58:41 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:41 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:58:41 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:58:41 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 996.226390] No source specified [ 996.228090] No source specified 01:58:41 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:58:41 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) [ 996.270793] kmemleak: Found object by alias at 0x607f1a62a618 [ 996.270809] CPU: 1 UID: 0 PID: 8629 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 996.270827] Tainted: [W]=WARN [ 996.270831] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 996.270838] Call Trace: [ 996.270842] [ 996.270847] dump_stack_lvl+0xca/0x120 [ 996.270873] __lookup_object+0x94/0xb0 [ 996.270890] delete_object_full+0x27/0x70 [ 996.270906] free_percpu+0x30/0x1160 [ 996.270923] ? arch_uprobe_clear_state+0x16/0x140 [ 996.270943] futex_hash_free+0x38/0xc0 [ 996.270957] mmput+0x2d3/0x390 [ 996.270975] do_exit+0x79d/0x2970 [ 996.270993] ? __pfx_do_exit+0x10/0x10 [ 996.271006] ? find_held_lock+0x2b/0x80 [ 996.271024] ? get_signal+0x835/0x2340 [ 996.271044] do_group_exit+0xd3/0x2a0 [ 996.271058] get_signal+0x2315/0x2340 [ 996.271077] ? put_task_stack+0xd2/0x240 [ 996.271093] ? __pfx_get_signal+0x10/0x10 [ 996.271110] ? __schedule+0xe91/0x3590 [ 996.271130] arch_do_signal_or_restart+0x80/0x790 [ 996.271148] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 996.271163] ? __x64_sys_futex+0x1c9/0x4d0 [ 996.271176] ? __x64_sys_futex+0x1d2/0x4d0 [ 996.271190] ? __pfx___x64_sys_futex+0x10/0x10 [ 996.271203] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 996.271216] ? xfd_validate_state+0x55/0x180 [ 996.271237] exit_to_user_mode_loop+0x8b/0x110 [ 996.271250] do_syscall_64+0x2f7/0x360 [ 996.271261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 996.271274] RIP: 0033:0x7ff07166db19 [ 996.271282] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 996.271287] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 996.271299] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 996.271306] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 996.271313] RBP: 00007ff071780f60 R08: 000000000000000e R09: 0000000000000000 [ 996.271320] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 996.271327] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 996.271343] [ 996.271347] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 996.271354] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295662976 [ 996.271361] kmemleak: min_count = 1 [ 996.271365] kmemleak: count = 0 [ 996.271369] kmemleak: flags = 0x21 [ 996.271372] kmemleak: checksum = 0 [ 996.271376] kmemleak: backtrace: [ 996.271379] pcpu_alloc_noprof+0x87a/0x1170 [ 996.271394] __percpu_counter_init_many+0x44/0x360 [ 996.271407] mm_init+0xcac/0x1170 [ 996.271415] copy_process+0x3ab7/0x73c0 [ 996.271425] kernel_clone+0xea/0x7f0 [ 996.271434] __do_sys_clone+0xce/0x120 [ 996.271449] do_syscall_64+0xbf/0x360 [ 996.271457] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:41 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 996.330643] kmemleak: Found object by alias at 0x607f1a62a61c [ 996.330670] CPU: 0 UID: 0 PID: 8624 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 996.330702] Tainted: [W]=WARN [ 996.330709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 996.330721] Call Trace: [ 996.330728] [ 996.330736] dump_stack_lvl+0xca/0x120 [ 996.330779] __lookup_object+0x94/0xb0 [ 996.330808] delete_object_full+0x27/0x70 [ 996.330837] free_percpu+0x30/0x1160 [ 996.330865] ? arch_uprobe_clear_state+0x16/0x140 [ 996.330900] futex_hash_free+0x38/0xc0 [ 996.330925] mmput+0x2d3/0x390 [ 996.330959] do_exit+0x79d/0x2970 [ 996.330983] ? signal_wake_up_state+0x85/0x120 [ 996.331011] ? zap_other_threads+0x2b9/0x3a0 [ 996.331039] ? __pfx_do_exit+0x10/0x10 [ 996.331062] ? do_group_exit+0x1c3/0x2a0 [ 996.331087] ? lock_release+0xc8/0x290 [ 996.331117] do_group_exit+0xd3/0x2a0 [ 996.331144] __x64_sys_exit_group+0x3e/0x50 [ 996.331168] x64_sys_call+0x18c5/0x18d0 [ 996.331196] do_syscall_64+0xbf/0x360 [ 996.331217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 996.331238] RIP: 0033:0x7f61678c2b19 [ 996.331253] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 996.331263] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 996.331283] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 996.331297] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 996.331310] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 996.331322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 996.331334] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 996.331363] [ 996.331370] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 996.331390] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295663107 [ 996.331403] kmemleak: min_count = 1 [ 996.331410] kmemleak: count = 0 [ 996.331416] kmemleak: flags = 0x21 [ 996.331423] kmemleak: checksum = 0 [ 996.331430] kmemleak: backtrace: [ 996.331436] pcpu_alloc_noprof+0x87a/0x1170 [ 996.331463] __percpu_counter_init_many+0x44/0x360 [ 996.331486] mm_init+0xcac/0x1170 [ 996.331500] copy_process+0x3ab7/0x73c0 [ 996.331518] kernel_clone+0xea/0x7f0 [ 996.331536] __do_sys_clone+0xce/0x120 [ 996.331554] do_syscall_64+0xbf/0x360 [ 996.331569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 996.397181] No source specified 01:58:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x0) 01:58:41 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:58:41 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:41 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:58:41 executing program 5: lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 996.522136] kmemleak: Found object by alias at 0x607f1a62a61c [ 996.522155] CPU: 1 UID: 0 PID: 8652 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 996.522174] Tainted: [W]=WARN [ 996.522178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 996.522185] Call Trace: [ 996.522189] [ 996.522194] dump_stack_lvl+0xca/0x120 [ 996.522221] __lookup_object+0x94/0xb0 [ 996.522238] delete_object_full+0x27/0x70 [ 996.522254] free_percpu+0x30/0x1160 [ 996.522270] ? arch_uprobe_clear_state+0x16/0x140 [ 996.522290] futex_hash_free+0x38/0xc0 [ 996.522304] mmput+0x2d3/0x390 [ 996.522327] do_exit+0x79d/0x2970 [ 996.522340] ? signal_wake_up_state+0x85/0x120 [ 996.522356] ? zap_other_threads+0x2b9/0x3a0 [ 996.522371] ? __pfx_do_exit+0x10/0x10 [ 996.522384] ? do_group_exit+0x1c3/0x2a0 [ 996.522397] ? lock_release+0xc8/0x290 [ 996.522414] do_group_exit+0xd3/0x2a0 [ 996.522428] __x64_sys_exit_group+0x3e/0x50 [ 996.522442] x64_sys_call+0x18c5/0x18d0 [ 996.522457] do_syscall_64+0xbf/0x360 [ 996.522469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 996.522481] RIP: 0033:0x7f61678c2b19 [ 996.522489] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 996.522494] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 996.522506] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 996.522513] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 996.522520] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 996.522527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 996.522534] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 996.522550] [ 996.522554] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 996.522561] kmemleak: comm "kworker/u10:6", pid 8657, jiffies 4295663290 [ 996.522567] kmemleak: min_count = 1 [ 996.522571] kmemleak: count = 0 [ 996.522575] kmemleak: flags = 0x21 [ 996.522578] kmemleak: checksum = 0 [ 996.522582] kmemleak: backtrace: [ 996.522586] pcpu_alloc_noprof+0x87a/0x1170 [ 996.522600] __percpu_counter_init_many+0x44/0x360 [ 996.522614] mm_init+0xcac/0x1170 [ 996.522622] mm_alloc+0xa0/0xd0 [ 996.522630] alloc_bprm+0x2e3/0x6e0 [ 996.522646] kernel_execve+0xb0/0x3d0 [ 996.522654] call_usermodehelper_exec_async+0x25f/0x4e0 [ 996.522670] ret_from_fork+0x34b/0x430 [ 996.522686] ret_from_fork_asm+0x1a/0x30 01:58:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x0) 01:58:50 executing program 5: lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:58:50 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:50 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:58:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:50 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:58:50 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:50 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1004.715837] kmemleak: Found object by alias at 0x607f1a62a618 [ 1004.715857] CPU: 0 UID: 0 PID: 8675 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1004.715876] Tainted: [W]=WARN [ 1004.715880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.715887] Call Trace: [ 1004.715891] [ 1004.715896] dump_stack_lvl+0xca/0x120 01:58:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1004.715924] __lookup_object+0x94/0xb0 [ 1004.715941] delete_object_full+0x27/0x70 [ 1004.715958] free_percpu+0x30/0x1160 [ 1004.715974] ? arch_uprobe_clear_state+0x16/0x140 [ 1004.715994] futex_hash_free+0x38/0xc0 [ 1004.716008] mmput+0x2d3/0x390 [ 1004.716027] do_exit+0x79d/0x2970 [ 1004.716045] ? __pfx_do_exit+0x10/0x10 [ 1004.716058] ? find_held_lock+0x2b/0x80 [ 1004.716076] ? get_signal+0x835/0x2340 [ 1004.716096] do_group_exit+0xd3/0x2a0 [ 1004.716111] get_signal+0x2315/0x2340 [ 1004.716128] ? put_task_stack+0xd2/0x240 [ 1004.716143] ? __pfx_get_signal+0x10/0x10 [ 1004.716158] ? __schedule+0xe91/0x3590 [ 1004.716178] arch_do_signal_or_restart+0x80/0x790 [ 1004.716196] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1004.716212] ? __x64_sys_futex+0x1c9/0x4d0 [ 1004.716224] ? __x64_sys_futex+0x1d2/0x4d0 [ 1004.716239] ? __pfx___x64_sys_futex+0x10/0x10 [ 1004.716251] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1004.716265] ? xfd_validate_state+0x55/0x180 [ 1004.716286] exit_to_user_mode_loop+0x8b/0x110 [ 1004.716298] do_syscall_64+0x2f7/0x360 [ 1004.716311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.716323] RIP: 0033:0x7ff07166db19 [ 1004.716332] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1004.716337] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1004.716348] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1004.716356] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1004.716363] RBP: 00007ff071780f60 R08: 000000000000000e R09: 0000000000000000 [ 1004.716370] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1004.716377] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1004.716393] [ 1004.716397] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1004.716404] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295671429 [ 1004.716410] kmemleak: min_count = 1 [ 1004.716414] kmemleak: count = 0 [ 1004.716418] kmemleak: flags = 0x21 [ 1004.716422] kmemleak: checksum = 0 [ 1004.716425] kmemleak: backtrace: [ 1004.716429] pcpu_alloc_noprof+0x87a/0x1170 [ 1004.716443] __percpu_counter_init_many+0x44/0x360 [ 1004.716457] mm_init+0xcac/0x1170 [ 1004.716464] copy_process+0x3ab7/0x73c0 [ 1004.716474] kernel_clone+0xea/0x7f0 [ 1004.716484] __do_sys_clone+0xce/0x120 [ 1004.716494] do_syscall_64+0xbf/0x360 [ 1004.716502] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:50 executing program 5: lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) [ 1004.777541] kmemleak: Found object by alias at 0x607f1a62a61c [ 1004.777562] CPU: 0 UID: 0 PID: 8677 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1004.777580] Tainted: [W]=WARN [ 1004.777584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 01:58:50 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1004.777592] Call Trace: [ 1004.777596] [ 1004.777600] dump_stack_lvl+0xca/0x120 [ 1004.777628] __lookup_object+0x94/0xb0 [ 1004.777645] delete_object_full+0x27/0x70 [ 1004.777661] free_percpu+0x30/0x1160 [ 1004.777677] ? arch_uprobe_clear_state+0x16/0x140 [ 1004.777697] futex_hash_free+0x38/0xc0 [ 1004.777711] mmput+0x2d3/0x390 [ 1004.777730] do_exit+0x79d/0x2970 [ 1004.777743] ? signal_wake_up_state+0x85/0x120 [ 1004.777759] ? zap_other_threads+0x2b9/0x3a0 [ 1004.777775] ? __pfx_do_exit+0x10/0x10 [ 1004.777787] ? do_group_exit+0x1c3/0x2a0 [ 1004.777800] ? lock_release+0xc8/0x290 [ 1004.777817] do_group_exit+0xd3/0x2a0 [ 1004.777835] __x64_sys_exit_group+0x3e/0x50 [ 1004.777849] x64_sys_call+0x18c5/0x18d0 [ 1004.777865] do_syscall_64+0xbf/0x360 [ 1004.777876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.777888] RIP: 0033:0x7f61678c2b19 [ 1004.777897] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1004.777902] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1004.777913] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1004.777921] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1004.777928] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1004.777935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1004.777942] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1004.777958] [ 1004.777962] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1004.777969] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295671549 [ 1004.777976] kmemleak: min_count = 1 [ 1004.777979] kmemleak: count = 0 [ 1004.777983] kmemleak: flags = 0x21 [ 1004.777987] kmemleak: checksum = 0 [ 1004.777991] kmemleak: backtrace: [ 1004.777994] pcpu_alloc_noprof+0x87a/0x1170 [ 1004.778009] __percpu_counter_init_many+0x44/0x360 [ 1004.778022] mm_init+0xcac/0x1170 [ 1004.778030] copy_process+0x3ab7/0x73c0 [ 1004.778040] kernel_clone+0xea/0x7f0 [ 1004.778050] __do_sys_clone+0xce/0x120 [ 1004.778060] do_syscall_64+0xbf/0x360 [ 1004.778068] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:50 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:50 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:50 executing program 6: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:58:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x0) 01:58:50 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:58:50 executing program 6: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:58:50 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) [ 1004.942107] kmemleak: Found object by alias at 0x607f1a62a61c [ 1004.942130] CPU: 0 UID: 0 PID: 8700 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1004.942148] Tainted: [W]=WARN [ 1004.942152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.942159] Call Trace: [ 1004.942163] [ 1004.942168] dump_stack_lvl+0xca/0x120 [ 1004.942193] __lookup_object+0x94/0xb0 [ 1004.942215] delete_object_full+0x27/0x70 [ 1004.942231] free_percpu+0x30/0x1160 [ 1004.942247] ? arch_uprobe_clear_state+0x16/0x140 [ 1004.942267] futex_hash_free+0x38/0xc0 [ 1004.942281] mmput+0x2d3/0x390 [ 1004.942301] do_exit+0x79d/0x2970 [ 1004.942318] ? __pfx_do_exit+0x10/0x10 [ 1004.942332] ? find_held_lock+0x2b/0x80 [ 1004.942350] ? get_signal+0x835/0x2340 [ 1004.942371] do_group_exit+0xd3/0x2a0 [ 1004.942385] get_signal+0x2315/0x2340 [ 1004.942403] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1004.942422] ? __pfx_get_signal+0x10/0x10 [ 1004.942441] ? __schedule+0xe91/0x3590 [ 1004.942461] arch_do_signal_or_restart+0x80/0x790 [ 1004.942479] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1004.942495] ? __x64_sys_futex+0x1c9/0x4d0 [ 1004.942507] ? __x64_sys_futex+0x1d2/0x4d0 [ 1004.942522] ? __pfx___x64_sys_futex+0x10/0x10 [ 1004.942535] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1004.942553] exit_to_user_mode_loop+0x8b/0x110 [ 1004.942566] do_syscall_64+0x2f7/0x360 [ 1004.942578] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.942590] RIP: 0033:0x7f61678c2b19 [ 1004.942599] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1004.942605] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1004.942616] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1004.942624] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1004.942631] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1004.942638] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1004.942645] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1004.942661] [ 1004.942664] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1004.942671] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295671711 [ 1004.942678] kmemleak: min_count = 1 [ 1004.942682] kmemleak: count = 0 [ 1004.942686] kmemleak: flags = 0x21 [ 1004.942690] kmemleak: checksum = 0 [ 1004.942693] kmemleak: backtrace: [ 1004.942697] pcpu_alloc_noprof+0x87a/0x1170 [ 1004.942711] __percpu_counter_init_many+0x44/0x360 [ 1004.942725] mm_init+0xcac/0x1170 [ 1004.942733] copy_process+0x3ab7/0x73c0 [ 1004.942743] kernel_clone+0xea/0x7f0 [ 1004.942753] __do_sys_clone+0xce/0x120 [ 1004.942763] do_syscall_64+0xbf/0x360 [ 1004.942771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.990239] kmemleak: Found object by alias at 0x607f1a62a618 [ 1004.990266] CPU: 1 UID: 0 PID: 8698 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1004.990298] Tainted: [W]=WARN [ 1004.990304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.990316] Call Trace: [ 1004.990323] [ 1004.990331] dump_stack_lvl+0xca/0x120 [ 1004.990371] __lookup_object+0x94/0xb0 [ 1004.990400] delete_object_full+0x27/0x70 [ 1004.990429] free_percpu+0x30/0x1160 [ 1004.990466] ? arch_uprobe_clear_state+0x16/0x140 [ 1004.990501] futex_hash_free+0x38/0xc0 [ 1004.990526] mmput+0x2d3/0x390 [ 1004.990558] do_exit+0x79d/0x2970 [ 1004.990582] ? signal_wake_up_state+0x85/0x120 [ 1004.990610] ? zap_other_threads+0x2b9/0x3a0 [ 1004.990638] ? __pfx_do_exit+0x10/0x10 [ 1004.990661] ? do_group_exit+0x1c3/0x2a0 [ 1004.990685] ? lock_release+0xc8/0x290 [ 1004.990716] do_group_exit+0xd3/0x2a0 [ 1004.990742] __x64_sys_exit_group+0x3e/0x50 [ 1004.990767] x64_sys_call+0x18c5/0x18d0 [ 1004.990795] do_syscall_64+0xbf/0x360 [ 1004.990815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.990835] RIP: 0033:0x7ff07166db19 [ 1004.990851] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1004.990860] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1004.990880] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1004.990893] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1004.990906] RBP: 0000000000000000 R08: 0000001b2cf23a84 R09: 0000000000000000 [ 1004.990918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1004.990930] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1004.990959] [ 1004.990965] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1004.990978] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295671711 [ 1004.990990] kmemleak: min_count = 1 [ 1004.990997] kmemleak: count = 0 [ 1004.991003] kmemleak: flags = 0x21 [ 1004.991010] kmemleak: checksum = 0 [ 1004.991017] kmemleak: backtrace: [ 1004.991023] pcpu_alloc_noprof+0x87a/0x1170 [ 1004.991049] __percpu_counter_init_many+0x44/0x360 [ 1004.991072] mm_init+0xcac/0x1170 [ 1004.991087] copy_process+0x3ab7/0x73c0 [ 1004.991104] kernel_clone+0xea/0x7f0 [ 1004.991122] __do_sys_clone+0xce/0x120 [ 1004.991140] do_syscall_64+0xbf/0x360 [ 1004.991155] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:58:59 executing program 7: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:58:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, 0x0) 01:58:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:58:59 executing program 6: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:58:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:59 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x0, 0x800, 0x515a) 01:58:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:58:59 executing program 2: socket(0x0, 0x800, 0x515a) 01:58:59 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:58:59 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1013.895015] kmemleak: Found object by alias at 0x607f1a62a61c [ 1013.895035] CPU: 1 UID: 0 PID: 8728 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1013.895053] Tainted: [W]=WARN [ 1013.895056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.895064] Call Trace: [ 1013.895067] [ 1013.895072] dump_stack_lvl+0xca/0x120 [ 1013.895100] __lookup_object+0x94/0xb0 [ 1013.895118] delete_object_full+0x27/0x70 [ 1013.895134] free_percpu+0x30/0x1160 [ 1013.895150] ? arch_uprobe_clear_state+0x16/0x140 [ 1013.895170] futex_hash_free+0x38/0xc0 [ 1013.895184] mmput+0x2d3/0x390 [ 1013.895203] do_exit+0x79d/0x2970 [ 1013.895220] ? __pfx_do_exit+0x10/0x10 [ 1013.895234] ? find_held_lock+0x2b/0x80 [ 1013.895252] ? get_signal+0x835/0x2340 [ 1013.895271] do_group_exit+0xd3/0x2a0 [ 1013.895286] get_signal+0x2315/0x2340 [ 1013.895303] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1013.895320] ? __pfx_get_signal+0x10/0x10 [ 1013.895336] ? __schedule+0xe91/0x3590 [ 1013.895356] arch_do_signal_or_restart+0x80/0x790 [ 1013.895373] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1013.895389] ? __x64_sys_futex+0x1c9/0x4d0 [ 1013.895402] ? __x64_sys_futex+0x1d2/0x4d0 [ 1013.895416] ? __pfx___x64_sys_futex+0x10/0x10 [ 1013.895429] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1013.895452] exit_to_user_mode_loop+0x8b/0x110 [ 1013.895466] do_syscall_64+0x2f7/0x360 [ 1013.895478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1013.895490] RIP: 0033:0x7f61678c2b19 [ 1013.895499] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1013.895504] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1013.895516] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1013.895523] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1013.895530] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1013.895537] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1013.895544] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1013.895560] [ 1013.895564] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1013.895570] kmemleak: comm "kworker/u10:10", pid 8737, jiffies 4295680663 [ 1013.895577] kmemleak: min_count = 1 [ 1013.895581] kmemleak: count = 0 [ 1013.895585] kmemleak: flags = 0x21 [ 1013.895589] kmemleak: checksum = 0 [ 1013.895593] kmemleak: backtrace: [ 1013.895596] pcpu_alloc_noprof+0x87a/0x1170 [ 1013.895611] __percpu_counter_init_many+0x44/0x360 [ 1013.895624] mm_init+0xcac/0x1170 [ 1013.895632] mm_alloc+0xa0/0xd0 [ 1013.895640] alloc_bprm+0x2e3/0x6e0 [ 1013.895657] kernel_execve+0xb0/0x3d0 [ 1013.895666] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1013.895681] ret_from_fork+0x34b/0x430 [ 1013.895697] ret_from_fork_asm+0x1a/0x30 [ 1013.918648] kmemleak: Found object by alias at 0x607f1a62a618 [ 1013.918660] CPU: 1 UID: 0 PID: 8730 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1013.918677] Tainted: [W]=WARN [ 1013.918681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.918687] Call Trace: [ 1013.918690] [ 1013.918694] dump_stack_lvl+0xca/0x120 [ 1013.918713] __lookup_object+0x94/0xb0 [ 1013.918727] delete_object_full+0x27/0x70 [ 1013.918742] free_percpu+0x30/0x1160 [ 1013.918756] ? arch_uprobe_clear_state+0x16/0x140 [ 1013.918774] futex_hash_free+0x38/0xc0 [ 1013.918787] mmput+0x2d3/0x390 [ 1013.918804] do_exit+0x79d/0x2970 [ 1013.918821] ? __pfx_do_exit+0x10/0x10 [ 1013.918834] ? find_held_lock+0x2b/0x80 [ 1013.918850] ? get_signal+0x835/0x2340 [ 1013.918869] do_group_exit+0xd3/0x2a0 [ 1013.918883] get_signal+0x2315/0x2340 [ 1013.918901] ? put_task_stack+0xd2/0x240 [ 1013.918915] ? __pfx_get_signal+0x10/0x10 [ 1013.918931] ? __schedule+0xe91/0x3590 [ 1013.918949] arch_do_signal_or_restart+0x80/0x790 [ 1013.918965] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1013.918981] ? __x64_sys_futex+0x1c9/0x4d0 [ 1013.918993] ? __x64_sys_futex+0x1d2/0x4d0 [ 1013.919008] ? __pfx___x64_sys_futex+0x10/0x10 [ 1013.919020] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1013.919032] ? xfd_validate_state+0x55/0x180 [ 1013.919052] exit_to_user_mode_loop+0x8b/0x110 [ 1013.919064] do_syscall_64+0x2f7/0x360 [ 1013.919075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1013.919086] RIP: 0033:0x7ff07166db19 [ 1013.919095] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1013.919100] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1013.919110] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1013.919117] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1013.919124] RBP: 00007ff071780f60 R08: 000000000000000e R09: 0000000000000000 [ 1013.919131] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1013.919138] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1013.919154] [ 1013.919157] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1013.919164] kmemleak: comm "kworker/u10:10", pid 8737, jiffies 4295680663 [ 1013.919170] kmemleak: min_count = 1 [ 1013.919174] kmemleak: count = 0 [ 1013.919178] kmemleak: flags = 0x21 [ 1013.919181] kmemleak: checksum = 0 [ 1013.919185] kmemleak: backtrace: [ 1013.919188] pcpu_alloc_noprof+0x87a/0x1170 [ 1013.919202] __percpu_counter_init_many+0x44/0x360 [ 1013.919213] mm_init+0xcac/0x1170 [ 1013.919221] mm_alloc+0xa0/0xd0 [ 1013.919230] alloc_bprm+0x2e3/0x6e0 [ 1013.919245] kernel_execve+0xb0/0x3d0 [ 1013.919253] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1013.919267] ret_from_fork+0x34b/0x430 [ 1013.919283] ret_from_fork_asm+0x1a/0x30 01:58:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:58:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:58:59 executing program 2: socket(0x0, 0x0, 0x515a) 01:59:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:59:07 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:59:07 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:59:07 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:07 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:07 executing program 2: socket(0x0, 0x0, 0x0) 01:59:07 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x44, 0x0) 01:59:08 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:08 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:59:08 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:08 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:08 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:59:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:59:08 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 01:59:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:08 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 01:59:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1022.761835] kmemleak: Found object by alias at 0x607f1a62a618 [ 1022.761855] CPU: 1 UID: 0 PID: 8782 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1022.761874] Tainted: [W]=WARN [ 1022.761878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.761885] Call Trace: [ 1022.761889] [ 1022.761894] dump_stack_lvl+0xca/0x120 [ 1022.761921] __lookup_object+0x94/0xb0 [ 1022.761938] delete_object_full+0x27/0x70 [ 1022.761954] free_percpu+0x30/0x1160 [ 1022.761970] ? arch_uprobe_clear_state+0x16/0x140 [ 1022.761990] futex_hash_free+0x38/0xc0 [ 1022.762005] mmput+0x2d3/0x390 [ 1022.762023] do_exit+0x79d/0x2970 [ 1022.762036] ? signal_wake_up_state+0x85/0x120 [ 1022.762052] ? zap_other_threads+0x2b9/0x3a0 [ 1022.762067] ? __pfx_do_exit+0x10/0x10 [ 1022.762080] ? do_group_exit+0x1c3/0x2a0 [ 1022.762093] ? lock_release+0xc8/0x290 [ 1022.762110] do_group_exit+0xd3/0x2a0 [ 1022.762124] __x64_sys_exit_group+0x3e/0x50 [ 1022.762138] x64_sys_call+0x18c5/0x18d0 [ 1022.762153] do_syscall_64+0xbf/0x360 [ 1022.762165] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1022.762177] RIP: 0033:0x7ff07166db19 [ 1022.762185] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1022.762190] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1022.762202] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1022.762209] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1022.762216] RBP: 0000000000000000 R08: 0000001b2cf23a60 R09: 0000000000000000 [ 1022.762223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1022.762230] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1022.762246] [ 1022.762249] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1022.762256] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295689439 [ 1022.762263] kmemleak: min_count = 1 [ 1022.762267] kmemleak: count = 0 [ 1022.762271] kmemleak: flags = 0x21 [ 1022.762274] kmemleak: checksum = 0 [ 1022.762278] kmemleak: backtrace: [ 1022.762282] pcpu_alloc_noprof+0x87a/0x1170 [ 1022.762296] __percpu_counter_init_many+0x44/0x360 [ 1022.762309] mm_init+0xcac/0x1170 [ 1022.762317] copy_process+0x3ab7/0x73c0 [ 1022.762327] kernel_clone+0xea/0x7f0 [ 1022.762336] __do_sys_clone+0xce/0x120 [ 1022.762346] do_syscall_64+0xbf/0x360 [ 1022.762355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1022.789060] kmemleak: Found object by alias at 0x607f1a62a61c [ 1022.789087] CPU: 0 UID: 0 PID: 8780 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1022.789123] Tainted: [W]=WARN [ 1022.789132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.789148] Call Trace: [ 1022.789155] [ 1022.789163] dump_stack_lvl+0xca/0x120 [ 1022.789205] __lookup_object+0x94/0xb0 [ 1022.789240] delete_object_full+0x27/0x70 [ 1022.789269] free_percpu+0x30/0x1160 [ 1022.789301] ? arch_uprobe_clear_state+0x16/0x140 [ 1022.789339] futex_hash_free+0x38/0xc0 [ 1022.789365] mmput+0x2d3/0x390 [ 1022.789408] do_exit+0x79d/0x2970 [ 1022.789432] ? signal_wake_up_state+0x85/0x120 [ 1022.789469] ? zap_other_threads+0x2b9/0x3a0 [ 1022.789503] ? __pfx_do_exit+0x10/0x10 [ 1022.789527] ? do_group_exit+0x1c3/0x2a0 [ 1022.789551] ? lock_release+0xc8/0x290 [ 1022.789591] do_group_exit+0xd3/0x2a0 [ 1022.789619] __x64_sys_exit_group+0x3e/0x50 [ 1022.789644] x64_sys_call+0x18c5/0x18d0 [ 1022.789677] do_syscall_64+0xbf/0x360 [ 1022.789698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1022.789720] RIP: 0033:0x7f61678c2b19 [ 1022.789737] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1022.789749] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1022.789774] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1022.789787] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1022.789800] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1022.789813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1022.789825] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1022.789860] [ 1022.789868] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1022.789882] kmemleak: comm "syz-executor.5", pid 285, jiffies 4295689439 [ 1022.789896] kmemleak: min_count = 1 [ 1022.789904] kmemleak: count = 0 [ 1022.789911] kmemleak: flags = 0x21 [ 1022.789921] kmemleak: checksum = 0 [ 1022.789930] kmemleak: backtrace: [ 1022.789935] pcpu_alloc_noprof+0x87a/0x1170 [ 1022.789963] __percpu_counter_init_many+0x44/0x360 [ 1022.789986] mm_init+0xcac/0x1170 [ 1022.790005] copy_process+0x3ab7/0x73c0 [ 1022.790028] kernel_clone+0xea/0x7f0 [ 1022.790048] __do_sys_clone+0xce/0x120 [ 1022.790068] do_syscall_64+0xbf/0x360 [ 1022.790085] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:59:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:59:08 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:08 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:59:17 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:17 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:17 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:59:17 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 01:59:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:59:17 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x3c, 0x0) 01:59:17 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:17 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1032.056560] kmemleak: Found object by alias at 0x607f1a62a618 [ 1032.056583] CPU: 1 UID: 0 PID: 8826 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1032.056601] Tainted: [W]=WARN [ 1032.056604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.056612] Call Trace: [ 1032.056616] [ 1032.056621] dump_stack_lvl+0xca/0x120 [ 1032.056646] __lookup_object+0x94/0xb0 [ 1032.056663] delete_object_full+0x27/0x70 [ 1032.056679] free_percpu+0x30/0x1160 [ 1032.056701] ? arch_uprobe_clear_state+0x16/0x140 [ 1032.056721] futex_hash_free+0x38/0xc0 [ 1032.056735] mmput+0x2d3/0x390 [ 1032.056754] do_exit+0x79d/0x2970 [ 1032.056768] ? lock_release+0xc8/0x290 [ 1032.056785] ? __pfx_do_exit+0x10/0x10 [ 1032.056798] ? find_held_lock+0x2b/0x80 [ 1032.056816] ? get_signal+0x835/0x2340 [ 1032.056837] do_group_exit+0xd3/0x2a0 [ 1032.056851] get_signal+0x2315/0x2340 [ 1032.056874] ? __pfx_get_signal+0x10/0x10 [ 1032.056890] ? do_futex+0x135/0x370 [ 1032.056904] ? __pfx_do_futex+0x10/0x10 [ 1032.056916] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1032.056931] arch_do_signal_or_restart+0x80/0x790 [ 1032.056949] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1032.056965] ? __x64_sys_futex+0x1c9/0x4d0 [ 1032.056977] ? __x64_sys_futex+0x1d2/0x4d0 [ 1032.056992] ? __pfx___x64_sys_futex+0x10/0x10 [ 1032.057004] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1032.057018] ? xfd_validate_state+0x55/0x180 [ 1032.057039] exit_to_user_mode_loop+0x8b/0x110 [ 1032.057052] do_syscall_64+0x2f7/0x360 [ 1032.057064] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.057076] RIP: 0033:0x7ff07166db19 [ 1032.057085] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1032.057090] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1032.057102] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1032.057109] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1032.057116] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1032.057124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1032.057131] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1032.057146] [ 1032.057150] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1032.057157] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295698700 [ 1032.057164] kmemleak: min_count = 1 [ 1032.057167] kmemleak: count = 0 [ 1032.057171] kmemleak: flags = 0x21 [ 1032.057175] kmemleak: checksum = 0 [ 1032.057178] kmemleak: backtrace: [ 1032.057182] pcpu_alloc_noprof+0x87a/0x1170 [ 1032.057197] __percpu_counter_init_many+0x44/0x360 [ 1032.057210] mm_init+0xcac/0x1170 [ 1032.057218] copy_process+0x3ab7/0x73c0 [ 1032.057228] kernel_clone+0xea/0x7f0 [ 1032.057238] __do_sys_clone+0xce/0x120 [ 1032.057248] do_syscall_64+0xbf/0x360 [ 1032.057256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.107331] kmemleak: Found object by alias at 0x607f1a62a61c [ 1032.107360] CPU: 0 UID: 0 PID: 8829 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1032.107395] Tainted: [W]=WARN [ 1032.107403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.107416] Call Trace: [ 1032.107423] [ 1032.107432] dump_stack_lvl+0xca/0x120 [ 1032.107483] __lookup_object+0x94/0xb0 [ 1032.107514] delete_object_full+0x27/0x70 [ 1032.107545] free_percpu+0x30/0x1160 [ 1032.107575] ? arch_uprobe_clear_state+0x16/0x140 [ 1032.107615] futex_hash_free+0x38/0xc0 [ 1032.107644] mmput+0x2d3/0x390 [ 1032.107679] do_exit+0x79d/0x2970 [ 1032.107712] ? __pfx_do_exit+0x10/0x10 [ 1032.107739] ? find_held_lock+0x2b/0x80 [ 1032.107773] ? get_signal+0x835/0x2340 [ 1032.107810] do_group_exit+0xd3/0x2a0 [ 1032.107839] get_signal+0x2315/0x2340 [ 1032.107873] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1032.107905] ? __pfx_get_signal+0x10/0x10 [ 1032.107936] ? __schedule+0xe91/0x3590 [ 1032.107974] arch_do_signal_or_restart+0x80/0x790 [ 1032.108008] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1032.108039] ? __x64_sys_futex+0x1c9/0x4d0 [ 1032.108063] ? __x64_sys_futex+0x1d2/0x4d0 [ 1032.108105] ? __pfx___x64_sys_futex+0x10/0x10 [ 1032.108136] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1032.108174] exit_to_user_mode_loop+0x8b/0x110 [ 1032.108199] do_syscall_64+0x2f7/0x360 [ 1032.108222] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.108244] RIP: 0033:0x7f61678c2b19 [ 1032.108261] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1032.108271] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1032.108293] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1032.108307] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1032.108321] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1032.108334] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1032.108348] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1032.108379] [ 1032.108386] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1032.108399] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295698700 [ 1032.108413] kmemleak: min_count = 1 [ 1032.108420] kmemleak: count = 0 [ 1032.108427] kmemleak: flags = 0x21 [ 1032.108434] kmemleak: checksum = 0 [ 1032.108442] kmemleak: backtrace: [ 1032.108448] pcpu_alloc_noprof+0x87a/0x1170 [ 1032.108477] __percpu_counter_init_many+0x44/0x360 [ 1032.108501] mm_init+0xcac/0x1170 [ 1032.108516] copy_process+0x3ab7/0x73c0 [ 1032.108536] kernel_clone+0xea/0x7f0 [ 1032.108554] __do_sys_clone+0xce/0x120 [ 1032.108574] do_syscall_64+0xbf/0x360 [ 1032.108590] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:59:27 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, 0x0) 01:59:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000004c80), r0) 01:59:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}], {0x10, 0x4}}, 0x34, 0x0) 01:59:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:59:27 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:27 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:27 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:27 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1041.766487] kmemleak: Found object by alias at 0x607f1a62a618 [ 1041.766508] CPU: 1 UID: 0 PID: 8844 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1041.766526] Tainted: [W]=WARN [ 1041.766531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1041.766538] Call Trace: [ 1041.766542] [ 1041.766547] dump_stack_lvl+0xca/0x120 [ 1041.766573] __lookup_object+0x94/0xb0 [ 1041.766591] delete_object_full+0x27/0x70 [ 1041.766607] free_percpu+0x30/0x1160 [ 1041.766623] ? arch_uprobe_clear_state+0x16/0x140 [ 1041.766643] futex_hash_free+0x38/0xc0 [ 1041.766658] mmput+0x2d3/0x390 [ 1041.766677] do_exit+0x79d/0x2970 [ 1041.766694] ? __pfx_do_exit+0x10/0x10 [ 1041.766708] ? find_held_lock+0x2b/0x80 [ 1041.766726] ? get_signal+0x835/0x2340 [ 1041.766750] do_group_exit+0xd3/0x2a0 [ 1041.766765] get_signal+0x2315/0x2340 [ 1041.766782] ? put_task_stack+0xd2/0x240 [ 1041.766796] ? __pfx_get_signal+0x10/0x10 [ 1041.766812] ? __schedule+0xe91/0x3590 [ 1041.766832] arch_do_signal_or_restart+0x80/0x790 [ 1041.766849] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1041.766865] ? __x64_sys_futex+0x1c9/0x4d0 [ 1041.766878] ? __x64_sys_futex+0x1d2/0x4d0 [ 1041.766892] ? __pfx___x64_sys_futex+0x10/0x10 [ 1041.766905] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1041.766918] ? xfd_validate_state+0x55/0x180 [ 1041.766939] exit_to_user_mode_loop+0x8b/0x110 [ 1041.766952] do_syscall_64+0x2f7/0x360 [ 1041.766964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.766976] RIP: 0033:0x7ff07166db19 [ 1041.766984] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1041.766990] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1041.767001] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1041.767009] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1041.767016] RBP: 00007ff071780f60 R08: 0000000000000016 R09: 0000000000000000 [ 1041.767023] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1041.767030] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1041.767045] [ 1041.767049] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1041.767056] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295708499 [ 1041.767062] kmemleak: min_count = 1 [ 1041.767066] kmemleak: count = 0 [ 1041.767070] kmemleak: flags = 0x21 [ 1041.767074] kmemleak: checksum = 0 [ 1041.767077] kmemleak: backtrace: [ 1041.767081] pcpu_alloc_noprof+0x87a/0x1170 [ 1041.767095] __percpu_counter_init_many+0x44/0x360 [ 1041.767108] mm_init+0xcac/0x1170 [ 1041.767116] copy_process+0x3ab7/0x73c0 [ 1041.767126] kernel_clone+0xea/0x7f0 [ 1041.767136] __do_sys_clone+0xce/0x120 [ 1041.767145] do_syscall_64+0xbf/0x360 [ 1041.767154] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.792745] kmemleak: Found object by alias at 0x607f1a62a61c [ 1041.792757] CPU: 1 UID: 0 PID: 8850 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1041.792774] Tainted: [W]=WARN [ 1041.792778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1041.792784] Call Trace: [ 1041.792787] [ 1041.792791] dump_stack_lvl+0xca/0x120 [ 1041.792810] __lookup_object+0x94/0xb0 [ 1041.792824] delete_object_full+0x27/0x70 [ 1041.792840] free_percpu+0x30/0x1160 [ 1041.792855] ? arch_uprobe_clear_state+0x16/0x140 [ 1041.792874] futex_hash_free+0x38/0xc0 [ 1041.792886] mmput+0x2d3/0x390 [ 1041.792904] do_exit+0x79d/0x2970 [ 1041.792920] ? __pfx_do_exit+0x10/0x10 [ 1041.792934] ? find_held_lock+0x2b/0x80 [ 1041.792954] ? get_signal+0x835/0x2340 [ 1041.792973] do_group_exit+0xd3/0x2a0 [ 1041.792988] get_signal+0x2315/0x2340 [ 1041.793005] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1041.793022] ? __pfx_get_signal+0x10/0x10 [ 1041.793038] ? __schedule+0xe91/0x3590 [ 1041.793057] arch_do_signal_or_restart+0x80/0x790 [ 1041.793074] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1041.793090] ? __x64_sys_futex+0x1c9/0x4d0 [ 1041.793102] ? __x64_sys_futex+0x1d2/0x4d0 [ 1041.793117] ? __pfx___x64_sys_futex+0x10/0x10 [ 1041.793130] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1041.793147] exit_to_user_mode_loop+0x8b/0x110 [ 1041.793159] do_syscall_64+0x2f7/0x360 [ 1041.793170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.793181] RIP: 0033:0x7f61678c2b19 [ 1041.793189] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1041.793194] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1041.793205] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1041.793212] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1041.793219] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1041.793226] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1041.793233] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1041.793248] [ 1041.793252] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1041.793259] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295708499 [ 1041.793265] kmemleak: min_count = 1 [ 1041.793269] kmemleak: count = 0 [ 1041.793273] kmemleak: flags = 0x21 [ 1041.793276] kmemleak: checksum = 0 [ 1041.793280] kmemleak: backtrace: [ 1041.793283] pcpu_alloc_noprof+0x87a/0x1170 [ 1041.793297] __percpu_counter_init_many+0x44/0x360 [ 1041.793309] mm_init+0xcac/0x1170 [ 1041.793316] copy_process+0x3ab7/0x73c0 [ 1041.793326] kernel_clone+0xea/0x7f0 [ 1041.793336] __do_sys_clone+0xce/0x120 [ 1041.793346] do_syscall_64+0xbf/0x360 [ 1041.793354] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:59:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x3, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) 01:59:27 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x0) 01:59:27 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:27 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:27 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1041.974909] kmemleak: Found object by alias at 0x607f1a62a61c [ 1041.974930] CPU: 1 UID: 0 PID: 8865 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1041.974949] Tainted: [W]=WARN [ 1041.974952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1041.974960] Call Trace: [ 1041.974964] [ 1041.974969] dump_stack_lvl+0xca/0x120 [ 1041.974997] __lookup_object+0x94/0xb0 [ 1041.975014] delete_object_full+0x27/0x70 [ 1041.975030] free_percpu+0x30/0x1160 [ 1041.975047] ? arch_uprobe_clear_state+0x16/0x140 [ 1041.975066] futex_hash_free+0x38/0xc0 [ 1041.975081] mmput+0x2d3/0x390 [ 1041.975100] do_exit+0x79d/0x2970 [ 1041.975117] ? __pfx_do_exit+0x10/0x10 [ 1041.975131] ? find_held_lock+0x2b/0x80 [ 1041.975149] ? get_signal+0x835/0x2340 [ 1041.975169] do_group_exit+0xd3/0x2a0 [ 1041.975183] get_signal+0x2315/0x2340 [ 1041.975200] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1041.975217] ? __pfx_get_signal+0x10/0x10 [ 1041.975233] ? __schedule+0xe91/0x3590 [ 1041.975253] arch_do_signal_or_restart+0x80/0x790 [ 1041.975271] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1041.975286] ? __x64_sys_futex+0x1c9/0x4d0 [ 1041.975299] ? __x64_sys_futex+0x1d2/0x4d0 [ 1041.975312] ? __sys_socket+0x9f/0x260 [ 1041.975327] ? __pfx___x64_sys_futex+0x10/0x10 [ 1041.975341] ? xfd_validate_state+0x55/0x180 [ 1041.975362] exit_to_user_mode_loop+0x8b/0x110 [ 1041.975375] do_syscall_64+0x2f7/0x360 [ 1041.975387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.975399] RIP: 0033:0x7f61678c2b19 [ 1041.975408] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1041.975413] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1041.975425] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1041.975432] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1041.975444] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1041.975451] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1041.975458] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1041.975474] [ 1041.975477] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1041.975484] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295708499 [ 1041.975491] kmemleak: min_count = 1 [ 1041.975495] kmemleak: count = 0 [ 1041.975499] kmemleak: flags = 0x21 [ 1041.975502] kmemleak: checksum = 0 [ 1041.975506] kmemleak: backtrace: [ 1041.975510] pcpu_alloc_noprof+0x87a/0x1170 [ 1041.975524] __percpu_counter_init_many+0x44/0x360 [ 1041.975538] mm_init+0xcac/0x1170 [ 1041.975546] copy_process+0x3ab7/0x73c0 [ 1041.975556] kernel_clone+0xea/0x7f0 [ 1041.975565] __do_sys_clone+0xce/0x120 [ 1041.975575] do_syscall_64+0xbf/0x360 [ 1041.975583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1042.010035] kmemleak: Found object by alias at 0x607f1a62a618 [ 1042.010058] CPU: 0 UID: 0 PID: 8862 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1042.010092] Tainted: [W]=WARN [ 1042.010099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1042.010111] Call Trace: [ 1042.010117] [ 1042.010125] dump_stack_lvl+0xca/0x120 [ 1042.010162] __lookup_object+0x94/0xb0 [ 1042.010190] delete_object_full+0x27/0x70 [ 1042.010220] free_percpu+0x30/0x1160 [ 1042.010248] ? arch_uprobe_clear_state+0x16/0x140 [ 1042.010284] futex_hash_free+0x38/0xc0 [ 1042.010308] mmput+0x2d3/0x390 [ 1042.010343] do_exit+0x79d/0x2970 [ 1042.010368] ? lock_release+0xc8/0x290 [ 1042.010398] ? __pfx_do_exit+0x10/0x10 [ 1042.010425] ? find_held_lock+0x2b/0x80 [ 1042.010464] ? get_signal+0x835/0x2340 [ 1042.010500] do_group_exit+0xd3/0x2a0 [ 1042.010529] get_signal+0x2315/0x2340 [ 1042.010572] ? __pfx_get_signal+0x10/0x10 [ 1042.010603] ? do_futex+0x135/0x370 [ 1042.010630] ? __pfx_do_futex+0x10/0x10 [ 1042.010652] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1042.010679] arch_do_signal_or_restart+0x80/0x790 [ 1042.010710] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1042.010741] ? __x64_sys_futex+0x1c9/0x4d0 [ 1042.010765] ? __x64_sys_futex+0x1d2/0x4d0 [ 1042.010794] ? __pfx___x64_sys_futex+0x10/0x10 [ 1042.010818] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1042.010843] ? xfd_validate_state+0x55/0x180 [ 1042.010881] exit_to_user_mode_loop+0x8b/0x110 [ 1042.010904] do_syscall_64+0x2f7/0x360 [ 1042.010926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1042.010948] RIP: 0033:0x7ff07166db19 01:59:27 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1042.010964] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1042.010974] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1042.010994] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1042.011009] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 01:59:27 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1042.011023] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1042.011036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1042.011049] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1042.011080] [ 1042.011087] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1042.011100] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295708499 [ 1042.011113] kmemleak: min_count = 1 [ 1042.011120] kmemleak: count = 0 [ 1042.011127] kmemleak: flags = 0x21 [ 1042.011134] kmemleak: checksum = 0 [ 1042.011141] kmemleak: backtrace: [ 1042.011147] pcpu_alloc_noprof+0x87a/0x1170 [ 1042.011176] __percpu_counter_init_many+0x44/0x360 [ 1042.011198] mm_init+0xcac/0x1170 [ 1042.011214] copy_process+0x3ab7/0x73c0 [ 1042.011233] kernel_clone+0xea/0x7f0 [ 1042.011252] __do_sys_clone+0xce/0x120 [ 1042.011271] do_syscall_64+0xbf/0x360 [ 1042.011288] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:59:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:36 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:59:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:59:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 01:59:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 01:59:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), r0) 01:59:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x0) 01:59:36 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:36 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:36 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}}, 0x40000850) 01:59:46 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:46 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}}, 0x0) 01:59:46 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 01:59:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x0) 01:59:46 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:59:46 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) 01:59:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 01:59:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) 01:59:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}}, 0x0) 01:59:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1060.971765] kmemleak: Found object by alias at 0x607f1a62a61c [ 1060.971786] CPU: 1 UID: 0 PID: 8930 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1060.971805] Tainted: [W]=WARN [ 1060.971808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1060.971816] Call Trace: [ 1060.971820] [ 1060.971824] dump_stack_lvl+0xca/0x120 [ 1060.971853] __lookup_object+0x94/0xb0 [ 1060.971871] delete_object_full+0x27/0x70 [ 1060.971887] free_percpu+0x30/0x1160 [ 1060.971904] ? arch_uprobe_clear_state+0x16/0x140 [ 1060.971924] futex_hash_free+0x38/0xc0 [ 1060.971939] mmput+0x2d3/0x390 [ 1060.971957] do_exit+0x79d/0x2970 [ 1060.971975] ? __pfx_do_exit+0x10/0x10 [ 1060.971989] ? find_held_lock+0x2b/0x80 [ 1060.972007] ? get_signal+0x835/0x2340 [ 1060.972029] do_group_exit+0xd3/0x2a0 [ 1060.972043] get_signal+0x2315/0x2340 [ 1060.972060] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1060.972077] ? __pfx_get_signal+0x10/0x10 [ 1060.972093] ? __schedule+0xe91/0x3590 [ 1060.972113] arch_do_signal_or_restart+0x80/0x790 [ 1060.972131] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1060.972147] ? __x64_sys_futex+0x1c9/0x4d0 [ 1060.972160] ? __x64_sys_futex+0x1d2/0x4d0 [ 1060.972173] ? __sys_socket+0x9f/0x260 [ 1060.972188] ? __pfx___x64_sys_futex+0x10/0x10 [ 1060.972206] exit_to_user_mode_loop+0x8b/0x110 [ 1060.972220] do_syscall_64+0x2f7/0x360 [ 1060.972232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1060.972244] RIP: 0033:0x7f61678c2b19 [ 1060.972257] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1060.972263] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1060.972275] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1060.972282] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1060.972289] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1060.972296] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1060.972303] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1060.972319] [ 1060.972323] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1060.972330] kmemleak: comm "kworker/u9:0", pid 8931, jiffies 4295727696 [ 1060.972336] kmemleak: min_count = 1 [ 1060.972340] kmemleak: count = 0 [ 1060.972344] kmemleak: flags = 0x21 [ 1060.972348] kmemleak: checksum = 0 [ 1060.972351] kmemleak: backtrace: [ 1060.972355] pcpu_alloc_noprof+0x87a/0x1170 [ 1060.972370] __percpu_counter_init_many+0x44/0x360 [ 1060.972383] mm_init+0xcac/0x1170 [ 1060.972391] mm_alloc+0xa0/0xd0 [ 1060.972399] alloc_bprm+0x2e3/0x6e0 [ 1060.972415] kernel_execve+0xb0/0x3d0 [ 1060.972424] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1060.972439] ret_from_fork+0x34b/0x430 [ 1060.972456] ret_from_fork_asm+0x1a/0x30 [ 1060.997868] kmemleak: Found object by alias at 0x607f1a62a618 [ 1060.997881] CPU: 1 UID: 0 PID: 8932 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1060.997899] Tainted: [W]=WARN [ 1060.997902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1060.997909] Call Trace: [ 1060.997912] [ 1060.997916] dump_stack_lvl+0xca/0x120 [ 1060.997940] __lookup_object+0x94/0xb0 [ 1060.997956] delete_object_full+0x27/0x70 [ 1060.997972] free_percpu+0x30/0x1160 [ 1060.997986] ? arch_uprobe_clear_state+0x16/0x140 [ 1060.998006] futex_hash_free+0x38/0xc0 [ 1060.998023] mmput+0x2d3/0x390 [ 1060.998040] do_exit+0x79d/0x2970 [ 1060.998058] ? __pfx_do_exit+0x10/0x10 [ 1060.998071] ? find_held_lock+0x2b/0x80 [ 1060.998088] ? get_signal+0x835/0x2340 [ 1060.998107] do_group_exit+0xd3/0x2a0 [ 1060.998122] get_signal+0x2315/0x2340 [ 1060.998139] ? put_task_stack+0xd2/0x240 [ 1060.998154] ? __pfx_get_signal+0x10/0x10 [ 1060.998170] ? __schedule+0xe91/0x3590 [ 1060.998189] arch_do_signal_or_restart+0x80/0x790 [ 1060.998206] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1060.998222] ? __x64_sys_futex+0x1c9/0x4d0 [ 1060.998234] ? __x64_sys_futex+0x1d2/0x4d0 [ 1060.998249] ? __pfx___x64_sys_futex+0x10/0x10 [ 1060.998262] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1060.998276] ? xfd_validate_state+0x55/0x180 [ 1060.998296] exit_to_user_mode_loop+0x8b/0x110 [ 1060.998309] do_syscall_64+0x2f7/0x360 [ 1060.998320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1060.998332] RIP: 0033:0x7ff07166db19 [ 1060.998340] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1060.998345] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1060.998356] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1060.998364] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1060.998371] RBP: 00007ff071780f60 R08: 000000000000000e R09: 0000000000000000 [ 1060.998377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1060.998384] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1060.998400] [ 1060.998403] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1060.998410] kmemleak: comm "kworker/u9:0", pid 8931, jiffies 4295727696 [ 1060.998417] kmemleak: min_count = 1 [ 1060.998421] kmemleak: count = 0 [ 1060.998424] kmemleak: flags = 0x21 [ 1060.998428] kmemleak: checksum = 0 [ 1060.998432] kmemleak: backtrace: [ 1060.998435] pcpu_alloc_noprof+0x87a/0x1170 [ 1060.998450] __percpu_counter_init_many+0x44/0x360 [ 1060.998462] mm_init+0xcac/0x1170 [ 1060.998470] mm_alloc+0xa0/0xd0 [ 1060.998478] alloc_bprm+0x2e3/0x6e0 [ 1060.998494] kernel_execve+0xb0/0x3d0 [ 1060.998503] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1060.998518] ret_from_fork+0x34b/0x430 [ 1060.998534] ret_from_fork_asm+0x1a/0x30 01:59:46 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}}, 0x0) 01:59:46 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:46 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) 01:59:46 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) 01:59:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={0x0}}, 0x0) 01:59:46 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:59:46 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 01:59:46 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x20000000) [ 1061.161587] vfat: Unknown parameter 'appraise' [ 1061.188126] No source specified [ 1061.201338] kmemleak: Found object by alias at 0x607f1a62a61c [ 1061.201353] CPU: 1 UID: 0 PID: 8950 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1061.201372] Tainted: [W]=WARN [ 1061.201375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.201383] Call Trace: [ 1061.201387] [ 1061.201392] dump_stack_lvl+0xca/0x120 [ 1061.201420] __lookup_object+0x94/0xb0 [ 1061.201441] delete_object_full+0x27/0x70 [ 1061.201458] free_percpu+0x30/0x1160 [ 1061.201475] ? arch_uprobe_clear_state+0x16/0x140 [ 1061.201495] futex_hash_free+0x38/0xc0 [ 1061.201510] mmput+0x2d3/0x390 [ 1061.201529] do_exit+0x79d/0x2970 [ 1061.201547] ? __pfx_do_exit+0x10/0x10 [ 1061.201561] ? find_held_lock+0x2b/0x80 [ 1061.201579] ? get_signal+0x835/0x2340 [ 1061.201600] do_group_exit+0xd3/0x2a0 [ 1061.201614] get_signal+0x2315/0x2340 [ 1061.201632] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1061.201649] ? __pfx_get_signal+0x10/0x10 [ 1061.201665] ? __schedule+0xe91/0x3590 [ 1061.201686] arch_do_signal_or_restart+0x80/0x790 [ 1061.201704] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1061.201720] ? __x64_sys_futex+0x1c9/0x4d0 [ 1061.201732] ? __x64_sys_futex+0x1d2/0x4d0 [ 1061.201746] ? fput_close_sync+0x114/0x240 [ 1061.201763] ? __pfx___x64_sys_futex+0x10/0x10 [ 1061.201775] ? __pfx_fput_close_sync+0x10/0x10 [ 1061.201790] ? dnotify_flush+0x79/0x4c0 [ 1061.201801] ? xfd_validate_state+0x55/0x180 [ 1061.201822] exit_to_user_mode_loop+0x8b/0x110 [ 1061.201835] do_syscall_64+0x2f7/0x360 [ 1061.201847] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1061.201860] RIP: 0033:0x7f61678c2b19 [ 1061.201869] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1061.201874] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1061.201885] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1061.201893] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1061.201900] RBP: 00007f61679d5f60 R08: 0000000000000016 R09: 0000000000000000 [ 1061.201907] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1061.201914] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1061.201930] [ 1061.201934] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1061.201941] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295727892 [ 1061.201948] kmemleak: min_count = 1 [ 1061.201952] kmemleak: count = 0 [ 1061.201955] kmemleak: flags = 0x21 [ 1061.201959] kmemleak: checksum = 0 [ 1061.201963] kmemleak: backtrace: [ 1061.201966] pcpu_alloc_noprof+0x87a/0x1170 [ 1061.201981] __percpu_counter_init_many+0x44/0x360 [ 1061.201994] mm_init+0xcac/0x1170 [ 1061.202002] copy_process+0x3ab7/0x73c0 [ 1061.202012] kernel_clone+0xea/0x7f0 [ 1061.202022] __do_sys_clone+0xce/0x120 [ 1061.202032] do_syscall_64+0xbf/0x360 [ 1061.202040] entry_SYSCALL_64_after_hwframe+0x77/0x7f 01:59:56 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) 01:59:56 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:56 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 01:59:56 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 01:59:56 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) 01:59:56 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 01:59:56 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 01:59:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0x0, 0x80) 01:59:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 01:59:56 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1070.730931] No source specified [ 1070.741066] kmemleak: Found object by alias at 0x607f1a62a618 [ 1070.741087] CPU: 0 UID: 0 PID: 8976 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1070.741105] Tainted: [W]=WARN [ 1070.741109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1070.741116] Call Trace: [ 1070.741120] [ 1070.741125] dump_stack_lvl+0xca/0x120 [ 1070.741149] __lookup_object+0x94/0xb0 [ 1070.741165] delete_object_full+0x27/0x70 [ 1070.741180] free_percpu+0x30/0x1160 [ 1070.741197] ? arch_uprobe_clear_state+0x16/0x140 [ 1070.741217] futex_hash_free+0x38/0xc0 [ 1070.741231] mmput+0x2d3/0x390 [ 1070.741254] do_exit+0x79d/0x2970 [ 1070.741271] ? __pfx_do_exit+0x10/0x10 [ 1070.741285] ? find_held_lock+0x2b/0x80 [ 1070.741303] ? get_signal+0x835/0x2340 [ 1070.741323] do_group_exit+0xd3/0x2a0 [ 1070.741338] get_signal+0x2315/0x2340 [ 1070.741355] ? put_task_stack+0xd2/0x240 [ 1070.741369] ? __pfx_get_signal+0x10/0x10 [ 1070.741385] ? __schedule+0xe91/0x3590 [ 1070.741404] arch_do_signal_or_restart+0x80/0x790 [ 1070.741422] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1070.741440] ? __x64_sys_futex+0x1c9/0x4d0 [ 1070.741453] ? __x64_sys_futex+0x1d2/0x4d0 [ 1070.741470] ? __pfx___x64_sys_futex+0x10/0x10 [ 1070.741482] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1070.741496] ? xfd_validate_state+0x55/0x180 [ 1070.741516] exit_to_user_mode_loop+0x8b/0x110 [ 1070.741529] do_syscall_64+0x2f7/0x360 [ 1070.741540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1070.741552] RIP: 0033:0x7ff07166db19 [ 1070.741560] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1070.741566] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1070.741577] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1070.741584] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1070.741591] RBP: 00007ff071780f60 R08: 0000000000000016 R09: 0000000000000000 [ 1070.741598] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1070.741605] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1070.741620] [ 1070.741624] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1070.741631] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295737487 [ 1070.741637] kmemleak: min_count = 1 [ 1070.741641] kmemleak: count = 0 [ 1070.741644] kmemleak: flags = 0x21 [ 1070.741648] kmemleak: checksum = 0 [ 1070.741652] kmemleak: backtrace: [ 1070.741655] pcpu_alloc_noprof+0x87a/0x1170 [ 1070.741670] __percpu_counter_init_many+0x44/0x360 [ 1070.741683] mm_init+0xcac/0x1170 [ 1070.741690] copy_process+0x3ab7/0x73c0 [ 1070.741700] kernel_clone+0xea/0x7f0 01:59:56 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1070.741710] __do_sys_clone+0xce/0x120 [ 1070.741720] do_syscall_64+0xbf/0x360 [ 1070.741728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1070.748551] vfat: Unknown parameter 'appraise' 01:59:56 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 02:00:06 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:06 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:06 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:00:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:06 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 02:00:06 executing program 7: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:00:06 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1080.590347] No source specified [ 1080.647712] vfat: Unknown parameter 'appraise' 02:00:06 executing program 6: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1080.715933] kmemleak: Found object by alias at 0x607f1a62a618 [ 1080.715966] CPU: 0 UID: 0 PID: 9010 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1080.716003] Tainted: [W]=WARN [ 1080.716011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1080.716025] Call Trace: [ 1080.716033] [ 1080.716042] dump_stack_lvl+0xca/0x120 [ 1080.716087] __lookup_object+0x94/0xb0 [ 1080.716120] delete_object_full+0x27/0x70 [ 1080.716153] free_percpu+0x30/0x1160 [ 1080.716186] ? arch_uprobe_clear_state+0x16/0x140 [ 1080.716227] futex_hash_free+0x38/0xc0 [ 1080.716255] mmput+0x2d3/0x390 [ 1080.716293] do_exit+0x79d/0x2970 [ 1080.716321] ? signal_wake_up_state+0x85/0x120 [ 1080.716353] ? zap_other_threads+0x2b9/0x3a0 [ 1080.716386] ? __pfx_do_exit+0x10/0x10 [ 1080.716413] ? do_group_exit+0x1c3/0x2a0 [ 1080.716449] ? lock_release+0xc8/0x290 [ 1080.716484] do_group_exit+0xd3/0x2a0 [ 1080.716515] __x64_sys_exit_group+0x3e/0x50 [ 1080.716545] x64_sys_call+0x18c5/0x18d0 [ 1080.716576] do_syscall_64+0xbf/0x360 [ 1080.716600] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1080.716624] RIP: 0033:0x7ff07166db19 [ 1080.716642] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1080.716653] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1080.716676] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1080.716692] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1080.716707] RBP: 0000000000000000 R08: 0000001b2cf21b60 R09: 0000000000000000 [ 1080.716722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.716747] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1080.716780] [ 1080.716788] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1080.716803] kmemleak: comm "syz-executor.6", pid 286, jiffies 4295747465 [ 1080.716817] kmemleak: min_count = 1 [ 1080.716825] kmemleak: count = 0 [ 1080.716833] kmemleak: flags = 0x21 [ 1080.716841] kmemleak: checksum = 0 [ 1080.716849] kmemleak: backtrace: [ 1080.716855] pcpu_alloc_noprof+0x87a/0x1170 [ 1080.716887] __percpu_counter_init_many+0x44/0x360 [ 1080.716913] mm_init+0xcac/0x1170 [ 1080.716930] copy_process+0x3ab7/0x73c0 [ 1080.716951] kernel_clone+0xea/0x7f0 [ 1080.716972] __do_sys_clone+0xce/0x120 [ 1080.716993] do_syscall_64+0xbf/0x360 [ 1080.717011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1080.791823] kmemleak: Found object by alias at 0x607f1a62a61c [ 1080.791851] CPU: 0 UID: 0 PID: 9009 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1080.791887] Tainted: [W]=WARN [ 1080.791894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1080.791907] Call Trace: [ 1080.791915] [ 1080.791923] dump_stack_lvl+0xca/0x120 [ 1080.791965] __lookup_object+0x94/0xb0 [ 1080.791996] delete_object_full+0x27/0x70 [ 1080.792029] free_percpu+0x30/0x1160 [ 1080.792060] ? arch_uprobe_clear_state+0x16/0x140 [ 1080.792099] futex_hash_free+0x38/0xc0 [ 1080.792126] mmput+0x2d3/0x390 [ 1080.792164] do_exit+0x79d/0x2970 [ 1080.792191] ? signal_wake_up_state+0x85/0x120 [ 1080.792221] ? zap_other_threads+0x2b9/0x3a0 [ 1080.792254] ? __pfx_do_exit+0x10/0x10 [ 1080.792279] ? do_group_exit+0x1c3/0x2a0 [ 1080.792307] ? lock_release+0xc8/0x290 [ 1080.792340] do_group_exit+0xd3/0x2a0 [ 1080.792371] __x64_sys_exit_group+0x3e/0x50 [ 1080.792401] x64_sys_call+0x18c5/0x18d0 [ 1080.792433] do_syscall_64+0xbf/0x360 [ 1080.792464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1080.792486] RIP: 0033:0x7f61678c2b19 [ 1080.792503] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1080.792514] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1080.792535] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1080.792550] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1080.792565] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1080.792578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.792592] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1080.792623] [ 1080.792631] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1080.792644] kmemleak: comm "syz-executor.6", pid 286, jiffies 4295747465 [ 1080.792658] kmemleak: min_count = 1 [ 1080.792666] kmemleak: count = 0 [ 1080.792673] kmemleak: flags = 0x21 [ 1080.792681] kmemleak: checksum = 0 [ 1080.792688] kmemleak: backtrace: [ 1080.792694] pcpu_alloc_noprof+0x87a/0x1170 [ 1080.792725] __percpu_counter_init_many+0x44/0x360 [ 1080.792761] mm_init+0xcac/0x1170 [ 1080.792777] copy_process+0x3ab7/0x73c0 [ 1080.792797] kernel_clone+0xea/0x7f0 [ 1080.792817] __do_sys_clone+0xce/0x120 [ 1080.792837] do_syscall_64+0xbf/0x360 [ 1080.792854] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:06 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x25, 0x800, 0x515a) 02:00:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:06 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:06 executing program 6: lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:06 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:06 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:06 executing program 7: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:00:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1080.993434] kmemleak: Found object by alias at 0x607f1a62a61c [ 1080.993458] CPU: 1 UID: 0 PID: 9038 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1080.993479] Tainted: [W]=WARN [ 1080.993483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1080.993492] Call Trace: [ 1080.993496] [ 1080.993502] dump_stack_lvl+0xca/0x120 [ 1080.993529] __lookup_object+0x94/0xb0 [ 1080.993548] delete_object_full+0x27/0x70 [ 1080.993566] free_percpu+0x30/0x1160 [ 1080.993585] ? arch_uprobe_clear_state+0x16/0x140 [ 1080.993608] futex_hash_free+0x38/0xc0 [ 1080.993624] mmput+0x2d3/0x390 [ 1080.993645] do_exit+0x79d/0x2970 [ 1080.993660] ? signal_wake_up_state+0x85/0x120 [ 1080.993678] ? zap_other_threads+0x2b9/0x3a0 [ 1080.993696] ? __pfx_do_exit+0x10/0x10 [ 1080.993711] ? do_group_exit+0x1c3/0x2a0 [ 1080.993726] ? lock_release+0xc8/0x290 [ 1080.993746] do_group_exit+0xd3/0x2a0 [ 1080.993763] __x64_sys_exit_group+0x3e/0x50 [ 1080.993779] x64_sys_call+0x18c5/0x18d0 [ 1080.993797] do_syscall_64+0xbf/0x360 [ 1080.993810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1080.993823] RIP: 0033:0x7f61678c2b19 [ 1080.993833] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1080.993839] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1080.993851] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1080.993860] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1080.993869] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1080.993876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.993884] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1080.993902] [ 1080.993906] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1080.993914] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295747605 [ 1080.993922] kmemleak: min_count = 1 [ 1080.993926] kmemleak: count = 0 [ 1080.993931] kmemleak: flags = 0x21 [ 1080.993935] kmemleak: checksum = 0 [ 1080.993939] kmemleak: backtrace: [ 1080.993943] pcpu_alloc_noprof+0x87a/0x1170 [ 1080.993960] __percpu_counter_init_many+0x44/0x360 [ 1080.993975] mm_init+0xcac/0x1170 [ 1080.993985] copy_process+0x3ab7/0x73c0 [ 1080.993996] kernel_clone+0xea/0x7f0 [ 1080.994007] __do_sys_clone+0xce/0x120 [ 1080.994019] do_syscall_64+0xbf/0x360 [ 1080.994028] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1081.096978] kmemleak: Found object by alias at 0x607f1a62a618 [ 1081.097006] CPU: 0 UID: 0 PID: 9033 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1081.097039] Tainted: [W]=WARN [ 1081.097046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1081.097058] Call Trace: [ 1081.097065] [ 1081.097073] dump_stack_lvl+0xca/0x120 [ 1081.097114] __lookup_object+0x94/0xb0 [ 1081.097145] delete_object_full+0x27/0x70 [ 1081.097175] free_percpu+0x30/0x1160 [ 1081.097205] ? arch_uprobe_clear_state+0x16/0x140 [ 1081.097241] futex_hash_free+0x38/0xc0 [ 1081.097266] mmput+0x2d3/0x390 [ 1081.097301] do_exit+0x79d/0x2970 [ 1081.097326] ? lock_release+0xc8/0x290 [ 1081.097356] ? __pfx_do_exit+0x10/0x10 [ 1081.097383] ? find_held_lock+0x2b/0x80 [ 1081.097414] ? get_signal+0x835/0x2340 [ 1081.097458] do_group_exit+0xd3/0x2a0 [ 1081.097487] get_signal+0x2315/0x2340 [ 1081.097530] ? __pfx_get_signal+0x10/0x10 [ 1081.097561] ? do_futex+0x135/0x370 [ 1081.097587] ? __pfx_do_futex+0x10/0x10 [ 1081.097615] arch_do_signal_or_restart+0x80/0x790 [ 1081.097648] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1081.097678] ? __x64_sys_futex+0x1c9/0x4d0 [ 1081.097701] ? __x64_sys_futex+0x1d2/0x4d0 [ 1081.097727] ? __sys_socket+0x9f/0x260 [ 1081.097754] ? __pfx___x64_sys_futex+0x10/0x10 [ 1081.097789] exit_to_user_mode_loop+0x8b/0x110 [ 1081.097812] do_syscall_64+0x2f7/0x360 [ 1081.097834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1081.097856] RIP: 0033:0x7ff07166db19 [ 1081.097872] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1081.097881] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1081.097902] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1081.097916] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1081.097929] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1081.097942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1081.097955] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1081.097984] [ 1081.097991] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1081.098004] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295747605 [ 1081.098017] kmemleak: min_count = 1 [ 1081.098024] kmemleak: count = 0 [ 1081.098031] kmemleak: flags = 0x21 [ 1081.098038] kmemleak: checksum = 0 [ 1081.098045] kmemleak: backtrace: [ 1081.098051] pcpu_alloc_noprof+0x87a/0x1170 [ 1081.098080] __percpu_counter_init_many+0x44/0x360 [ 1081.098103] mm_init+0xcac/0x1170 [ 1081.098118] copy_process+0x3ab7/0x73c0 [ 1081.098136] kernel_clone+0xea/0x7f0 [ 1081.098155] __do_sys_clone+0xce/0x120 [ 1081.098173] do_syscall_64+0xbf/0x360 [ 1081.098189] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:17 executing program 6: lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:17 executing program 7: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:00:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:17 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:17 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:17 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:17 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:17 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) [ 1091.717026] vfat: Unknown parameter 'appraise' 02:00:17 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1091.792497] kmemleak: Found object by alias at 0x607f1a62a618 [ 1091.792516] CPU: 1 UID: 0 PID: 9076 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1091.792534] Tainted: [W]=WARN [ 1091.792537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.792544] Call Trace: [ 1091.792548] [ 1091.792553] dump_stack_lvl+0xca/0x120 [ 1091.792577] __lookup_object+0x94/0xb0 [ 1091.792593] delete_object_full+0x27/0x70 [ 1091.792609] free_percpu+0x30/0x1160 [ 1091.792625] ? arch_uprobe_clear_state+0x16/0x140 [ 1091.792645] futex_hash_free+0x38/0xc0 [ 1091.792659] mmput+0x2d3/0x390 [ 1091.792677] do_exit+0x79d/0x2970 [ 1091.792690] ? lock_release+0xc8/0x290 [ 1091.792706] ? __pfx_do_exit+0x10/0x10 [ 1091.792719] ? find_held_lock+0x2b/0x80 [ 1091.792736] ? get_signal+0x835/0x2340 [ 1091.792755] do_group_exit+0xd3/0x2a0 [ 1091.792770] get_signal+0x2315/0x2340 [ 1091.792792] ? __pfx_get_signal+0x10/0x10 [ 1091.792807] ? do_futex+0x135/0x370 [ 1091.792820] ? __pfx_do_futex+0x10/0x10 [ 1091.792835] arch_do_signal_or_restart+0x80/0x790 [ 1091.792852] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1091.792868] ? __x64_sys_futex+0x1c9/0x4d0 [ 1091.792880] ? __x64_sys_futex+0x1d2/0x4d0 [ 1091.792900] ? __sys_socket+0x9f/0x260 [ 1091.792914] ? __pfx___x64_sys_futex+0x10/0x10 [ 1091.792932] exit_to_user_mode_loop+0x8b/0x110 [ 1091.792945] do_syscall_64+0x2f7/0x360 [ 1091.792957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1091.792969] RIP: 0033:0x7ff07166db19 [ 1091.792977] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1091.792982] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1091.792994] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1091.793001] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1091.793008] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1091.793014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1091.793021] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1091.793037] [ 1091.793040] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1091.793051] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295758458 [ 1091.793058] kmemleak: min_count = 1 [ 1091.793061] kmemleak: count = 0 [ 1091.793065] kmemleak: flags = 0x21 [ 1091.793068] kmemleak: checksum = 0 [ 1091.793072] kmemleak: backtrace: [ 1091.793076] pcpu_alloc_noprof+0x87a/0x1170 [ 1091.793090] __percpu_counter_init_many+0x44/0x360 [ 1091.793103] mm_init+0xcac/0x1170 [ 1091.793111] copy_process+0x3ab7/0x73c0 [ 1091.793120] kernel_clone+0xea/0x7f0 [ 1091.793130] __do_sys_clone+0xce/0x120 [ 1091.793139] do_syscall_64+0xbf/0x360 [ 1091.793148] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:17 executing program 6: lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:17 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:17 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740), 0x0, 0x6}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1091.866006] kmemleak: Found object by alias at 0x607f1a62a61c [ 1091.866035] CPU: 0 UID: 0 PID: 9071 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1091.866070] Tainted: [W]=WARN [ 1091.866077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.866090] Call Trace: [ 1091.866097] [ 1091.866105] dump_stack_lvl+0xca/0x120 [ 1091.866145] __lookup_object+0x94/0xb0 [ 1091.866175] delete_object_full+0x27/0x70 [ 1091.866207] free_percpu+0x30/0x1160 [ 1091.866236] ? arch_uprobe_clear_state+0x16/0x140 [ 1091.866274] futex_hash_free+0x38/0xc0 [ 1091.866299] mmput+0x2d3/0x390 [ 1091.866335] do_exit+0x79d/0x2970 [ 1091.866361] ? lock_release+0xc8/0x290 [ 1091.866392] ? __pfx_do_exit+0x10/0x10 [ 1091.866420] ? find_held_lock+0x2b/0x80 [ 1091.866461] ? get_signal+0x835/0x2340 [ 1091.866499] do_group_exit+0xd3/0x2a0 [ 1091.866529] get_signal+0x2315/0x2340 [ 1091.866564] ? __pfx_signal_setup_done+0x10/0x10 [ 1091.866605] ? __pfx_get_signal+0x10/0x10 [ 1091.866637] ? do_futex+0x135/0x370 [ 1091.866664] ? __pfx_do_futex+0x10/0x10 [ 1091.866688] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1091.866716] arch_do_signal_or_restart+0x80/0x790 [ 1091.866749] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1091.866781] ? __x64_sys_futex+0x1c9/0x4d0 [ 1091.866805] ? __x64_sys_futex+0x1d2/0x4d0 [ 1091.866834] ? __pfx___x64_sys_futex+0x10/0x10 [ 1091.866859] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1091.866895] exit_to_user_mode_loop+0x8b/0x110 [ 1091.866919] do_syscall_64+0x2f7/0x360 [ 1091.866942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1091.866964] RIP: 0033:0x7f61678c2b19 [ 1091.866981] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1091.866991] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1091.867012] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1091.867027] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1091.867041] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1091.867054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1091.867068] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1091.867099] [ 1091.867107] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1091.867120] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295758458 [ 1091.867133] kmemleak: min_count = 1 [ 1091.867141] kmemleak: count = 0 [ 1091.867148] kmemleak: flags = 0x21 [ 1091.867155] kmemleak: checksum = 0 [ 1091.867162] kmemleak: backtrace: [ 1091.867168] pcpu_alloc_noprof+0x87a/0x1170 [ 1091.867198] __percpu_counter_init_many+0x44/0x360 [ 1091.867221] mm_init+0xcac/0x1170 [ 1091.867237] copy_process+0x3ab7/0x73c0 [ 1091.867257] kernel_clone+0xea/0x7f0 [ 1091.867281] __do_sys_clone+0xce/0x120 [ 1091.867299] do_syscall_64+0xbf/0x360 [ 1091.867316] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:17 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:00:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0), 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1091.942180] vfat: Unknown parameter 'appraise' 02:00:17 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:17 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:17 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1092.160415] vfat: Unknown parameter 'appraise' [ 1092.202295] vfat: Unknown parameter 'appraise' [ 1099.235932] kworker/u10:1 (49) used greatest stack depth: 23280 bytes left 02:00:26 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:26 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:26 executing program 6: lsetxattr$system_posix_acl(0x0, &(0x7f0000001140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 02:00:26 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:26 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:26 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:00:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:26 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1100.922033] vfat: Unknown parameter 'appraise' 02:00:26 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:26 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1100.991659] vfat: Unknown parameter 'appraise' 02:00:26 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:00:26 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1101.013039] kmemleak: Found object by alias at 0x607f1a62a61c [ 1101.013065] CPU: 0 UID: 0 PID: 9112 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1101.013098] Tainted: [W]=WARN [ 1101.013105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1101.013116] Call Trace: [ 1101.013123] [ 1101.013131] dump_stack_lvl+0xca/0x120 [ 1101.013169] __lookup_object+0x94/0xb0 [ 1101.013198] delete_object_full+0x27/0x70 [ 1101.013226] free_percpu+0x30/0x1160 [ 1101.013254] ? arch_uprobe_clear_state+0x16/0x140 [ 1101.013297] futex_hash_free+0x38/0xc0 [ 1101.013321] mmput+0x2d3/0x390 [ 1101.013353] do_exit+0x79d/0x2970 [ 1101.013378] ? signal_wake_up_state+0x85/0x120 [ 1101.013406] ? zap_other_threads+0x2b9/0x3a0 [ 1101.013434] ? __pfx_do_exit+0x10/0x10 [ 1101.013457] ? do_group_exit+0x1c3/0x2a0 [ 1101.013482] ? lock_release+0xc8/0x290 [ 1101.013512] do_group_exit+0xd3/0x2a0 [ 1101.013539] __x64_sys_exit_group+0x3e/0x50 [ 1101.013564] x64_sys_call+0x18c5/0x18d0 [ 1101.013591] do_syscall_64+0xbf/0x360 [ 1101.013611] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1101.013632] RIP: 0033:0x7f61678c2b19 [ 1101.013647] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1101.013657] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1101.013677] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1101.013690] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1101.013703] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1101.013715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.013727] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1101.013756] [ 1101.013762] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1101.013775] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295767740 [ 1101.013787] kmemleak: min_count = 1 [ 1101.013794] kmemleak: count = 0 [ 1101.013800] kmemleak: flags = 0x21 [ 1101.013807] kmemleak: checksum = 0 [ 1101.013814] kmemleak: backtrace: [ 1101.013820] pcpu_alloc_noprof+0x87a/0x1170 [ 1101.013846] __percpu_counter_init_many+0x44/0x360 [ 1101.013869] mm_init+0xcac/0x1170 [ 1101.013883] copy_process+0x3ab7/0x73c0 [ 1101.013901] kernel_clone+0xea/0x7f0 [ 1101.013919] __do_sys_clone+0xce/0x120 [ 1101.013937] do_syscall_64+0xbf/0x360 [ 1101.013952] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1101.033374] vfat: Unknown parameter 'appraise' [ 1101.045965] vfat: Unknown parameter 'appraise' [ 1101.057115] kmemleak: Found object by alias at 0x607f1a62a618 [ 1101.057130] CPU: 1 UID: 0 PID: 9127 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1101.057149] Tainted: [W]=WARN [ 1101.057153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1101.057161] Call Trace: [ 1101.057165] [ 1101.057169] dump_stack_lvl+0xca/0x120 [ 1101.057195] __lookup_object+0x94/0xb0 [ 1101.057212] delete_object_full+0x27/0x70 [ 1101.057229] free_percpu+0x30/0x1160 [ 1101.057246] ? arch_uprobe_clear_state+0x16/0x140 [ 1101.057266] futex_hash_free+0x38/0xc0 [ 1101.057282] mmput+0x2d3/0x390 [ 1101.057301] do_exit+0x79d/0x2970 [ 1101.057315] ? signal_wake_up_state+0x85/0x120 [ 1101.057332] ? zap_other_threads+0x2b9/0x3a0 [ 1101.057347] ? __pfx_do_exit+0x10/0x10 [ 1101.057360] ? do_group_exit+0x1c3/0x2a0 [ 1101.057373] ? lock_release+0xc8/0x290 [ 1101.057391] do_group_exit+0xd3/0x2a0 [ 1101.057406] __x64_sys_exit_group+0x3e/0x50 [ 1101.057420] x64_sys_call+0x18c5/0x18d0 [ 1101.057440] do_syscall_64+0xbf/0x360 [ 1101.057452] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1101.057464] RIP: 0033:0x7ff07166db19 [ 1101.057477] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1101.057482] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1101.057493] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1101.057501] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1101.057508] RBP: 0000000000000000 R08: 0000001b2cf20454 R09: 0000000000000000 [ 1101.057515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.057522] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1101.057538] [ 1101.057542] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1101.057549] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295767740 [ 1101.057556] kmemleak: min_count = 1 [ 1101.057560] kmemleak: count = 0 [ 1101.057564] kmemleak: flags = 0x21 [ 1101.057568] kmemleak: checksum = 0 [ 1101.057571] kmemleak: backtrace: [ 1101.057575] pcpu_alloc_noprof+0x87a/0x1170 [ 1101.057591] __percpu_counter_init_many+0x44/0x360 [ 1101.057607] mm_init+0xcac/0x1170 [ 1101.057616] copy_process+0x3ab7/0x73c0 [ 1101.057626] kernel_clone+0xea/0x7f0 [ 1101.057636] __do_sys_clone+0xce/0x120 [ 1101.057646] do_syscall_64+0xbf/0x360 [ 1101.057654] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:26 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:26 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:26 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1101.159185] vfat: Unknown parameter 'appraise' [ 1101.210888] kmemleak: Found object by alias at 0x607f1a62a61c [ 1101.210902] CPU: 1 UID: 0 PID: 9137 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1101.210920] Tainted: [W]=WARN [ 1101.210925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1101.210933] Call Trace: [ 1101.210938] [ 1101.210942] dump_stack_lvl+0xca/0x120 [ 1101.210971] __lookup_object+0x94/0xb0 [ 1101.210988] delete_object_full+0x27/0x70 [ 1101.211004] free_percpu+0x30/0x1160 [ 1101.211021] ? arch_uprobe_clear_state+0x16/0x140 [ 1101.211041] futex_hash_free+0x38/0xc0 [ 1101.211055] mmput+0x2d3/0x390 [ 1101.211074] do_exit+0x79d/0x2970 [ 1101.211087] ? signal_wake_up_state+0x85/0x120 [ 1101.211103] ? zap_other_threads+0x2b9/0x3a0 [ 1101.211118] ? __pfx_do_exit+0x10/0x10 [ 1101.211131] ? do_group_exit+0x1c3/0x2a0 [ 1101.211144] ? lock_release+0xc8/0x290 [ 1101.211161] do_group_exit+0xd3/0x2a0 [ 1101.211175] __x64_sys_exit_group+0x3e/0x50 [ 1101.211189] x64_sys_call+0x18c5/0x18d0 [ 1101.211204] do_syscall_64+0xbf/0x360 [ 1101.211216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1101.211228] RIP: 0033:0x7f61678c2b19 [ 1101.211237] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1101.211242] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1101.211253] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1101.211260] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1101.211268] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1101.211275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.211281] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1101.211297] [ 1101.211300] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1101.211307] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295767740 [ 1101.211314] kmemleak: min_count = 1 [ 1101.211318] kmemleak: count = 0 [ 1101.211322] kmemleak: flags = 0x21 [ 1101.211325] kmemleak: checksum = 0 [ 1101.211329] kmemleak: backtrace: [ 1101.211332] pcpu_alloc_noprof+0x87a/0x1170 [ 1101.211347] __percpu_counter_init_many+0x44/0x360 [ 1101.211360] mm_init+0xcac/0x1170 [ 1101.211368] copy_process+0x3ab7/0x73c0 [ 1101.211378] kernel_clone+0xea/0x7f0 [ 1101.211388] __do_sys_clone+0xce/0x120 [ 1101.211398] do_syscall_64+0xbf/0x360 [ 1101.211406] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:35 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:35 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:35 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:35 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:35 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:00:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1109.983186] vfat: Unknown parameter 'appraise' [ 1110.004920] kmemleak: Found object by alias at 0x607f1a62a618 [ 1110.004935] CPU: 1 UID: 0 PID: 9152 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1110.004952] Tainted: [W]=WARN [ 1110.004956] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1110.004963] Call Trace: [ 1110.004967] [ 1110.004971] dump_stack_lvl+0xca/0x120 [ 1110.004994] __lookup_object+0x94/0xb0 [ 1110.005010] delete_object_full+0x27/0x70 [ 1110.005026] free_percpu+0x30/0x1160 [ 1110.005042] ? arch_uprobe_clear_state+0x16/0x140 [ 1110.005062] futex_hash_free+0x38/0xc0 [ 1110.005075] mmput+0x2d3/0x390 [ 1110.005094] do_exit+0x79d/0x2970 [ 1110.005107] ? signal_wake_up_state+0x85/0x120 [ 1110.005167] ? zap_other_threads+0x2b9/0x3a0 [ 1110.005182] ? __pfx_do_exit+0x10/0x10 [ 1110.005195] ? do_group_exit+0x1c3/0x2a0 [ 1110.005208] ? lock_release+0xc8/0x290 [ 1110.005224] do_group_exit+0xd3/0x2a0 [ 1110.005239] __x64_sys_exit_group+0x3e/0x50 [ 1110.005252] x64_sys_call+0x18c5/0x18d0 [ 1110.005267] do_syscall_64+0xbf/0x360 [ 1110.005279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.005290] RIP: 0033:0x7ff07166db19 [ 1110.005299] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1110.005304] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1110.005314] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1110.005322] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1110.005329] RBP: 0000000000000000 R08: 0000001b2cf20944 R09: 0000000000000000 [ 1110.005335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1110.005342] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1110.005357] [ 1110.005360] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1110.005367] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295776736 [ 1110.005374] kmemleak: min_count = 1 [ 1110.005377] kmemleak: count = 0 [ 1110.005381] kmemleak: flags = 0x21 [ 1110.005384] kmemleak: checksum = 0 [ 1110.005388] kmemleak: backtrace: [ 1110.005392] pcpu_alloc_noprof+0x87a/0x1170 [ 1110.005406] __percpu_counter_init_many+0x44/0x360 [ 1110.005419] mm_init+0xcac/0x1170 [ 1110.005427] copy_process+0x3ab7/0x73c0 [ 1110.005441] kernel_clone+0xea/0x7f0 [ 1110.005450] __do_sys_clone+0xce/0x120 [ 1110.005460] do_syscall_64+0xbf/0x360 [ 1110.005468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.032138] kmemleak: Found object by alias at 0x607f1a62a61c [ 1110.032150] CPU: 1 UID: 0 PID: 9154 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1110.032167] Tainted: [W]=WARN [ 1110.032170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1110.032176] Call Trace: [ 1110.032180] [ 1110.032184] dump_stack_lvl+0xca/0x120 [ 1110.032202] __lookup_object+0x94/0xb0 [ 1110.032217] delete_object_full+0x27/0x70 [ 1110.032232] free_percpu+0x30/0x1160 [ 1110.032246] ? arch_uprobe_clear_state+0x16/0x140 [ 1110.032265] futex_hash_free+0x38/0xc0 [ 1110.032277] mmput+0x2d3/0x390 [ 1110.032295] do_exit+0x79d/0x2970 [ 1110.032307] ? signal_wake_up_state+0x85/0x120 [ 1110.032321] ? zap_other_threads+0x2b9/0x3a0 [ 1110.032337] ? __pfx_do_exit+0x10/0x10 [ 1110.032349] ? do_group_exit+0x1c3/0x2a0 [ 1110.032362] ? lock_release+0xc8/0x290 [ 1110.032378] do_group_exit+0xd3/0x2a0 [ 1110.032393] __x64_sys_exit_group+0x3e/0x50 [ 1110.032406] x64_sys_call+0x18c5/0x18d0 [ 1110.032420] do_syscall_64+0xbf/0x360 [ 1110.032431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.032446] RIP: 0033:0x7f61678c2b19 [ 1110.032455] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1110.032460] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1110.032470] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1110.032478] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1110.032485] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1110.032491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1110.032498] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1110.032513] [ 1110.032517] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1110.032523] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295776736 [ 1110.032530] kmemleak: min_count = 1 [ 1110.032534] kmemleak: count = 0 [ 1110.032538] kmemleak: flags = 0x21 [ 1110.032541] kmemleak: checksum = 0 [ 1110.032545] kmemleak: backtrace: [ 1110.032548] pcpu_alloc_noprof+0x87a/0x1170 [ 1110.032562] __percpu_counter_init_many+0x44/0x360 [ 1110.032573] mm_init+0xcac/0x1170 [ 1110.032581] copy_process+0x3ab7/0x73c0 [ 1110.032591] kernel_clone+0xea/0x7f0 [ 1110.032600] __do_sys_clone+0xce/0x120 [ 1110.032610] do_syscall_64+0xbf/0x360 [ 1110.032619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.056349] vfat: Unknown parameter 'appraise' 02:00:35 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) [ 1110.083696] vfat: Unknown parameter 'appraise' 02:00:44 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:44 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:44 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1, 0x6}], 0x0, 0x0) 02:00:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:44 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) [ 1118.834750] kmemleak: Found object by alias at 0x607f1a62a618 [ 1118.834788] CPU: 0 UID: 0 PID: 9178 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1118.834832] Tainted: [W]=WARN [ 1118.834841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1118.834857] Call Trace: [ 1118.834866] [ 1118.834877] dump_stack_lvl+0xca/0x120 [ 1118.834928] __lookup_object+0x94/0xb0 [ 1118.834966] delete_object_full+0x27/0x70 [ 1118.835004] free_percpu+0x30/0x1160 [ 1118.835042] ? arch_uprobe_clear_state+0x16/0x140 [ 1118.835089] futex_hash_free+0x38/0xc0 [ 1118.835121] mmput+0x2d3/0x390 [ 1118.835165] do_exit+0x79d/0x2970 [ 1118.835198] ? signal_wake_up_state+0x85/0x120 [ 1118.835235] ? zap_other_threads+0x2b9/0x3a0 [ 1118.835273] ? __pfx_do_exit+0x10/0x10 [ 1118.835304] ? do_group_exit+0x1c3/0x2a0 [ 1118.835337] ? lock_release+0xc8/0x290 [ 1118.835377] do_group_exit+0xd3/0x2a0 [ 1118.835413] __x64_sys_exit_group+0x3e/0x50 [ 1118.835462] x64_sys_call+0x18c5/0x18d0 [ 1118.835498] do_syscall_64+0xbf/0x360 [ 1118.835526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1118.835554] RIP: 0033:0x7ff07166db19 [ 1118.835574] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1118.835587] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1118.835614] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1118.835632] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1118.835650] RBP: 0000000000000000 R08: 0000001b2cf20984 R09: 0000000000000000 [ 1118.835666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1118.835683] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1118.835721] [ 1118.835730] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1118.835746] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295785563 [ 1118.835764] kmemleak: min_count = 1 [ 1118.835773] kmemleak: count = 0 [ 1118.835782] kmemleak: flags = 0x21 [ 1118.835791] kmemleak: checksum = 0 [ 1118.835800] kmemleak: backtrace: [ 1118.835808] pcpu_alloc_noprof+0x87a/0x1170 [ 1118.835844] __percpu_counter_init_many+0x44/0x360 [ 1118.835874] mm_init+0xcac/0x1170 [ 1118.835894] copy_process+0x3ab7/0x73c0 [ 1118.835918] kernel_clone+0xea/0x7f0 [ 1118.835942] __do_sys_clone+0xce/0x120 [ 1118.835967] do_syscall_64+0xbf/0x360 [ 1118.835988] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:44 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:00:44 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) [ 1118.893628] vfat: Unknown parameter 'appraise' 02:00:44 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:44 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:44 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:00:44 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:00:44 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) [ 1119.094387] vfat: Unknown parameter 'appraise' 02:00:44 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1119.177374] kmemleak: Found object by alias at 0x607f1a62a618 [ 1119.177404] CPU: 0 UID: 0 PID: 9210 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1119.177447] Tainted: [W]=WARN [ 1119.177454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.177467] Call Trace: [ 1119.177474] [ 1119.177483] dump_stack_lvl+0xca/0x120 [ 1119.177525] __lookup_object+0x94/0xb0 [ 1119.177555] delete_object_full+0x27/0x70 [ 1119.177587] free_percpu+0x30/0x1160 [ 1119.177617] ? arch_uprobe_clear_state+0x16/0x140 [ 1119.177655] futex_hash_free+0x38/0xc0 [ 1119.177682] mmput+0x2d3/0x390 [ 1119.177717] do_exit+0x79d/0x2970 [ 1119.177743] ? signal_wake_up_state+0x85/0x120 [ 1119.177773] ? zap_other_threads+0x2b9/0x3a0 [ 1119.177804] ? __pfx_do_exit+0x10/0x10 [ 1119.177828] ? do_group_exit+0x1c3/0x2a0 [ 1119.177855] ? lock_release+0xc8/0x290 [ 1119.177887] do_group_exit+0xd3/0x2a0 [ 1119.177916] __x64_sys_exit_group+0x3e/0x50 [ 1119.177943] x64_sys_call+0x18c5/0x18d0 [ 1119.177972] do_syscall_64+0xbf/0x360 [ 1119.177995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.178016] RIP: 0033:0x7ff07166db19 [ 1119.178033] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1119.178043] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1119.178065] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1119.178080] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1119.178094] RBP: 0000000000000000 R08: 0000001b2cf209c8 R09: 0000000000000000 [ 1119.178108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1119.178121] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1119.178151] [ 1119.178158] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1119.178171] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295785919 [ 1119.178185] kmemleak: min_count = 1 [ 1119.178192] kmemleak: count = 0 [ 1119.178200] kmemleak: flags = 0x21 [ 1119.178207] kmemleak: checksum = 0 [ 1119.178214] kmemleak: backtrace: [ 1119.178220] pcpu_alloc_noprof+0x87a/0x1170 [ 1119.178250] __percpu_counter_init_many+0x44/0x360 [ 1119.178274] mm_init+0xcac/0x1170 [ 1119.178290] copy_process+0x3ab7/0x73c0 [ 1119.178310] kernel_clone+0xea/0x7f0 [ 1119.178329] __do_sys_clone+0xce/0x120 [ 1119.178349] do_syscall_64+0xbf/0x360 [ 1119.178366] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:44 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:00:44 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:00:44 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:44 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:44 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) [ 1119.317826] vfat: Unknown parameter 'appraise' 02:00:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:00:54 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:00:54 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:00:54 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:00:54 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:54 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:54 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:54 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1128.755706] kmemleak: Found object by alias at 0x607f1a62a618 [ 1128.755739] CPU: 0 UID: 0 PID: 9250 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1128.755772] Tainted: [W]=WARN [ 1128.755779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1128.755791] Call Trace: [ 1128.755798] [ 1128.755806] dump_stack_lvl+0xca/0x120 [ 1128.755846] __lookup_object+0x94/0xb0 [ 1128.755875] delete_object_full+0x27/0x70 [ 1128.755904] free_percpu+0x30/0x1160 [ 1128.755933] ? arch_uprobe_clear_state+0x16/0x140 [ 1128.755968] futex_hash_free+0x38/0xc0 [ 1128.755993] mmput+0x2d3/0x390 [ 1128.756026] do_exit+0x79d/0x2970 [ 1128.756050] ? signal_wake_up_state+0x85/0x120 [ 1128.756078] ? zap_other_threads+0x2b9/0x3a0 [ 1128.756106] ? __pfx_do_exit+0x10/0x10 [ 1128.756129] ? do_group_exit+0x1c3/0x2a0 [ 1128.756154] ? lock_release+0xc8/0x290 [ 1128.756184] do_group_exit+0xd3/0x2a0 [ 1128.756211] __x64_sys_exit_group+0x3e/0x50 [ 1128.756236] x64_sys_call+0x18c5/0x18d0 [ 1128.756263] do_syscall_64+0xbf/0x360 [ 1128.756284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1128.756304] RIP: 0033:0x7ff07166db19 [ 1128.756320] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1128.756329] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1128.756349] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1128.756363] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1128.756376] RBP: 0000000000000000 R08: 0000001b2cf20944 R09: 0000000000000000 [ 1128.756389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1128.756401] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1128.756436] [ 1128.756443] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1128.756455] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295795410 [ 1128.756468] kmemleak: min_count = 1 [ 1128.756475] kmemleak: count = 0 [ 1128.756481] kmemleak: flags = 0x21 [ 1128.756488] kmemleak: checksum = 0 [ 1128.756495] kmemleak: backtrace: [ 1128.756500] pcpu_alloc_noprof+0x87a/0x1170 [ 1128.756527] __percpu_counter_init_many+0x44/0x360 [ 1128.756550] mm_init+0xcac/0x1170 [ 1128.756565] copy_process+0x3ab7/0x73c0 [ 1128.756583] kernel_clone+0xea/0x7f0 [ 1128.756600] __do_sys_clone+0xce/0x120 [ 1128.756618] do_syscall_64+0xbf/0x360 [ 1128.756634] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:00:54 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:54 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 02:00:54 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1128.803919] kmemleak: Found object by alias at 0x607f1a62a61c [ 1128.803947] CPU: 0 UID: 0 PID: 9252 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1128.803979] Tainted: [W]=WARN [ 1128.803986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1128.803998] Call Trace: [ 1128.804005] [ 1128.804013] dump_stack_lvl+0xca/0x120 [ 1128.804052] __lookup_object+0x94/0xb0 [ 1128.804080] delete_object_full+0x27/0x70 [ 1128.804109] free_percpu+0x30/0x1160 [ 1128.804136] ? arch_uprobe_clear_state+0x16/0x140 [ 1128.804172] futex_hash_free+0x38/0xc0 [ 1128.804196] mmput+0x2d3/0x390 [ 1128.804228] do_exit+0x79d/0x2970 [ 1128.804252] ? lock_release+0xc8/0x290 [ 1128.804281] ? __pfx_do_exit+0x10/0x10 [ 1128.804306] ? find_held_lock+0x2b/0x80 [ 1128.804337] ? get_signal+0x835/0x2340 [ 1128.804372] do_group_exit+0xd3/0x2a0 [ 1128.804399] get_signal+0x2315/0x2340 [ 1128.804431] ? __pfx_signal_setup_done+0x10/0x10 [ 1128.804477] ? __pfx_get_signal+0x10/0x10 [ 1128.804506] ? do_futex+0x135/0x370 [ 1128.804531] ? __pfx_do_futex+0x10/0x10 [ 1128.804552] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1128.804578] arch_do_signal_or_restart+0x80/0x790 [ 1128.804608] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1128.804638] ? __x64_sys_futex+0x1c9/0x4d0 [ 1128.804660] ? __x64_sys_futex+0x1d2/0x4d0 [ 1128.804687] ? __pfx___x64_sys_futex+0x10/0x10 [ 1128.804709] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1128.804742] exit_to_user_mode_loop+0x8b/0x110 [ 1128.804764] do_syscall_64+0x2f7/0x360 [ 1128.804785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1128.804806] RIP: 0033:0x7f61678c2b19 [ 1128.804822] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1128.804831] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1128.804851] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1128.804865] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1128.804877] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1128.804890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1128.804902] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1128.804931] [ 1128.804937] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1128.804949] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295795410 [ 1128.804962] kmemleak: min_count = 1 [ 1128.804969] kmemleak: count = 0 [ 1128.804975] kmemleak: flags = 0x21 [ 1128.804982] kmemleak: checksum = 0 [ 1128.804988] kmemleak: backtrace: [ 1128.804994] pcpu_alloc_noprof+0x87a/0x1170 [ 1128.805021] __percpu_counter_init_many+0x44/0x360 [ 1128.805043] mm_init+0xcac/0x1170 [ 1128.805058] copy_process+0x3ab7/0x73c0 [ 1128.805076] kernel_clone+0xea/0x7f0 [ 1128.805093] __do_sys_clone+0xce/0x120 [ 1128.805112] do_syscall_64+0xbf/0x360 [ 1128.805127] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1128.935358] No source specified 02:01:04 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 02:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:01:04 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:01:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 02:01:04 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:01:04 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:01:04 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1138.818737] No source specified [ 1138.826116] kmemleak: Found object by alias at 0x607f1a62a61c [ 1138.826132] CPU: 1 UID: 0 PID: 9283 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1138.826151] Tainted: [W]=WARN [ 1138.826155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.826162] Call Trace: [ 1138.826166] [ 1138.826171] dump_stack_lvl+0xca/0x120 [ 1138.826196] __lookup_object+0x94/0xb0 [ 1138.826213] delete_object_full+0x27/0x70 [ 1138.826229] free_percpu+0x30/0x1160 [ 1138.826245] ? arch_uprobe_clear_state+0x16/0x140 [ 1138.826265] futex_hash_free+0x38/0xc0 [ 1138.826284] mmput+0x2d3/0x390 [ 1138.826303] do_exit+0x79d/0x2970 [ 1138.826316] ? signal_wake_up_state+0x85/0x120 [ 1138.826332] ? zap_other_threads+0x2b9/0x3a0 [ 1138.826348] ? __pfx_do_exit+0x10/0x10 [ 1138.826360] ? do_group_exit+0x1c3/0x2a0 [ 1138.826373] ? lock_release+0xc8/0x290 [ 1138.826390] do_group_exit+0xd3/0x2a0 [ 1138.826405] __x64_sys_exit_group+0x3e/0x50 [ 1138.826418] x64_sys_call+0x18c5/0x18d0 [ 1138.826434] do_syscall_64+0xbf/0x360 [ 1138.826445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1138.826457] RIP: 0033:0x7f61678c2b19 [ 1138.826466] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1138.826471] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1138.826482] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1138.826490] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1138.826497] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1138.826504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1138.826511] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1138.826527] [ 1138.826531] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1138.826538] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295805541 [ 1138.826545] kmemleak: min_count = 1 [ 1138.826549] kmemleak: count = 0 [ 1138.826553] kmemleak: flags = 0x21 [ 1138.826557] kmemleak: checksum = 0 [ 1138.826560] kmemleak: backtrace: [ 1138.826564] pcpu_alloc_noprof+0x87a/0x1170 [ 1138.826579] __percpu_counter_init_many+0x44/0x360 [ 1138.826592] mm_init+0xcac/0x1170 [ 1138.826600] copy_process+0x3ab7/0x73c0 [ 1138.826610] kernel_clone+0xea/0x7f0 [ 1138.826619] __do_sys_clone+0xce/0x120 [ 1138.826629] do_syscall_64+0xbf/0x360 [ 1138.826638] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:04 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1138.898956] kmemleak: Found object by alias at 0x607f1a62a618 [ 1138.898991] CPU: 0 UID: 0 PID: 9280 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1138.899026] Tainted: [W]=WARN [ 1138.899034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.899046] Call Trace: [ 1138.899054] [ 1138.899063] dump_stack_lvl+0xca/0x120 [ 1138.899105] __lookup_object+0x94/0xb0 [ 1138.899136] delete_object_full+0x27/0x70 [ 1138.899167] free_percpu+0x30/0x1160 [ 1138.899198] ? arch_uprobe_clear_state+0x16/0x140 [ 1138.899235] futex_hash_free+0x38/0xc0 [ 1138.899262] mmput+0x2d3/0x390 [ 1138.899298] do_exit+0x79d/0x2970 [ 1138.899324] ? signal_wake_up_state+0x85/0x120 [ 1138.899354] ? zap_other_threads+0x2b9/0x3a0 [ 1138.899384] ? __pfx_do_exit+0x10/0x10 [ 1138.899409] ? do_group_exit+0x1c3/0x2a0 [ 1138.899443] ? lock_release+0xc8/0x290 [ 1138.899475] do_group_exit+0xd3/0x2a0 [ 1138.899504] __x64_sys_exit_group+0x3e/0x50 [ 1138.899531] x64_sys_call+0x18c5/0x18d0 [ 1138.899561] do_syscall_64+0xbf/0x360 [ 1138.899583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1138.899605] RIP: 0033:0x7ff07166db19 [ 1138.899622] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1138.899632] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1138.899654] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1138.899668] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1138.899682] RBP: 0000000000000000 R08: 0000001b2cf20964 R09: 0000000000000000 [ 1138.899696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1138.899708] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1138.899739] [ 1138.899747] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1138.899760] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295805541 [ 1138.899773] kmemleak: min_count = 1 [ 1138.899781] kmemleak: count = 0 [ 1138.899788] kmemleak: flags = 0x21 [ 1138.899795] kmemleak: checksum = 0 [ 1138.899802] kmemleak: backtrace: [ 1138.899808] pcpu_alloc_noprof+0x87a/0x1170 [ 1138.899838] __percpu_counter_init_many+0x44/0x360 [ 1138.899862] mm_init+0xcac/0x1170 [ 1138.899878] copy_process+0x3ab7/0x73c0 [ 1138.899897] kernel_clone+0xea/0x7f0 [ 1138.899916] __do_sys_clone+0xce/0x120 [ 1138.899937] do_syscall_64+0xbf/0x360 [ 1138.899955] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:04 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:01:04 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x114, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:04 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1139.013767] kmemleak: Found object by alias at 0x607f1a62a61c [ 1139.013784] CPU: 1 UID: 0 PID: 9300 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1139.013803] Tainted: [W]=WARN [ 1139.013807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1139.013814] Call Trace: [ 1139.013818] [ 1139.013823] dump_stack_lvl+0xca/0x120 [ 1139.013850] __lookup_object+0x94/0xb0 [ 1139.013866] delete_object_full+0x27/0x70 [ 1139.013882] free_percpu+0x30/0x1160 [ 1139.013899] ? arch_uprobe_clear_state+0x16/0x140 [ 1139.013918] futex_hash_free+0x38/0xc0 [ 1139.013933] mmput+0x2d3/0x390 [ 1139.013952] do_exit+0x79d/0x2970 [ 1139.013965] ? signal_wake_up_state+0x85/0x120 [ 1139.013981] ? zap_other_threads+0x2b9/0x3a0 [ 1139.013997] ? __pfx_do_exit+0x10/0x10 [ 1139.014009] ? do_group_exit+0x1c3/0x2a0 [ 1139.014022] ? lock_release+0xc8/0x290 [ 1139.014039] do_group_exit+0xd3/0x2a0 [ 1139.014054] __x64_sys_exit_group+0x3e/0x50 [ 1139.014067] x64_sys_call+0x18c5/0x18d0 [ 1139.014083] do_syscall_64+0xbf/0x360 02:01:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 02:01:04 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 02:01:04 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1139.014095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1139.014106] RIP: 0033:0x7f61678c2b19 [ 1139.014115] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1139.014121] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1139.014132] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1139.014140] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1139.014147] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1139.014154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1139.014161] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1139.014177] [ 1139.014180] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1139.014187] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295805743 [ 1139.014194] kmemleak: min_count = 1 [ 1139.014198] kmemleak: count = 0 [ 1139.014201] kmemleak: flags = 0x21 [ 1139.014205] kmemleak: checksum = 0 [ 1139.014209] kmemleak: backtrace: [ 1139.014212] pcpu_alloc_noprof+0x87a/0x1170 [ 1139.014227] __percpu_counter_init_many+0x44/0x360 [ 1139.014240] mm_init+0xcac/0x1170 [ 1139.014248] copy_process+0x3ab7/0x73c0 [ 1139.014258] kernel_clone+0xea/0x7f0 [ 1139.014267] __do_sys_clone+0xce/0x120 [ 1139.014277] do_syscall_64+0xbf/0x360 [ 1139.014286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1139.062086] No source specified [ 1139.084142] vfat: Unknown parameter 'appraise' 02:01:12 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:01:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) 02:01:12 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:01:12 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:12 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:12 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:12 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1146.818275] vfat: Unknown parameter 'appraise' [ 1146.820953] kmemleak: Found object by alias at 0x607f1a62a618 [ 1146.820968] CPU: 1 UID: 0 PID: 9327 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1146.820986] Tainted: [W]=WARN [ 1146.820990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1146.820997] Call Trace: [ 1146.821001] [ 1146.821005] dump_stack_lvl+0xca/0x120 [ 1146.821032] __lookup_object+0x94/0xb0 [ 1146.821049] delete_object_full+0x27/0x70 [ 1146.821065] free_percpu+0x30/0x1160 [ 1146.821081] ? arch_uprobe_clear_state+0x16/0x140 [ 1146.821101] futex_hash_free+0x38/0xc0 [ 1146.821116] mmput+0x2d3/0x390 [ 1146.821134] do_exit+0x79d/0x2970 [ 1146.821152] ? __pfx_do_exit+0x10/0x10 [ 1146.821166] ? find_held_lock+0x2b/0x80 [ 1146.821184] ? get_signal+0x835/0x2340 [ 1146.821203] do_group_exit+0xd3/0x2a0 [ 1146.821218] get_signal+0x2315/0x2340 [ 1146.821235] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1146.821252] ? __pfx_get_signal+0x10/0x10 [ 1146.821268] ? __schedule+0xe91/0x3590 [ 1146.821292] arch_do_signal_or_restart+0x80/0x790 [ 1146.821309] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1146.821325] ? __x64_sys_futex+0x1c9/0x4d0 [ 1146.821337] ? __x64_sys_futex+0x1d2/0x4d0 [ 1146.821351] ? __sys_socket+0x9f/0x260 [ 1146.821365] ? __pfx___x64_sys_futex+0x10/0x10 [ 1146.821378] ? xfd_validate_state+0x55/0x180 [ 1146.821399] exit_to_user_mode_loop+0x8b/0x110 [ 1146.821412] do_syscall_64+0x2f7/0x360 [ 1146.821424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1146.821436] RIP: 0033:0x7ff07166db19 [ 1146.821444] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1146.821449] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1146.821460] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1146.821468] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1146.821475] RBP: 00007ff071780f60 R08: 000000000000000e R09: 0000000000000000 [ 1146.821482] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1146.821490] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1146.821505] [ 1146.821509] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1146.821516] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295813541 [ 1146.821523] kmemleak: min_count = 1 [ 1146.821527] kmemleak: count = 0 [ 1146.821531] kmemleak: flags = 0x21 [ 1146.821534] kmemleak: checksum = 0 [ 1146.821538] kmemleak: backtrace: [ 1146.821541] pcpu_alloc_noprof+0x87a/0x1170 [ 1146.821556] __percpu_counter_init_many+0x44/0x360 [ 1146.821569] mm_init+0xcac/0x1170 [ 1146.821577] copy_process+0x3ab7/0x73c0 [ 1146.821587] kernel_clone+0xea/0x7f0 [ 1146.821597] __do_sys_clone+0xce/0x120 [ 1146.821616] do_syscall_64+0xbf/0x360 [ 1146.821625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1146.846911] vfat: Unknown parameter 'appraise' [ 1146.854241] vfat: Unknown parameter 'appraise' 02:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0xc0, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:12 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) [ 1146.894870] kmemleak: Found object by alias at 0x607f1a62a61c [ 1146.894883] CPU: 1 UID: 0 PID: 9331 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1146.894901] Tainted: [W]=WARN [ 1146.894904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1146.894911] Call Trace: [ 1146.894915] [ 1146.894920] dump_stack_lvl+0xca/0x120 [ 1146.894943] __lookup_object+0x94/0xb0 [ 1146.894958] delete_object_full+0x27/0x70 [ 1146.894975] free_percpu+0x30/0x1160 [ 1146.894991] ? arch_uprobe_clear_state+0x16/0x140 [ 1146.895013] futex_hash_free+0x38/0xc0 [ 1146.895027] mmput+0x2d3/0x390 [ 1146.895045] do_exit+0x79d/0x2970 [ 1146.895058] ? lock_release+0xc8/0x290 [ 1146.895074] ? __pfx_do_exit+0x10/0x10 [ 1146.895087] ? find_held_lock+0x2b/0x80 [ 1146.895103] ? get_signal+0x835/0x2340 [ 1146.895122] do_group_exit+0xd3/0x2a0 [ 1146.895137] get_signal+0x2315/0x2340 [ 1146.895156] ? __call_rcu_common.constprop.0+0x4c1/0x960 [ 1146.895173] ? __pfx_get_signal+0x10/0x10 [ 1146.895189] ? do_futex+0x135/0x370 [ 1146.895202] ? __pfx_do_futex+0x10/0x10 [ 1146.895217] arch_do_signal_or_restart+0x80/0x790 [ 1146.895233] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1146.895249] ? __x64_sys_futex+0x1c9/0x4d0 [ 1146.895261] ? __x64_sys_futex+0x1d2/0x4d0 [ 1146.895275] ? fput_close_sync+0x114/0x240 [ 1146.895291] ? __pfx___x64_sys_futex+0x10/0x10 [ 1146.895303] ? __pfx_fput_close_sync+0x10/0x10 [ 1146.895317] ? dnotify_flush+0x79/0x4c0 [ 1146.895333] exit_to_user_mode_loop+0x8b/0x110 [ 1146.895345] do_syscall_64+0x2f7/0x360 [ 1146.895357] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1146.895369] RIP: 0033:0x7f61678c2b19 [ 1146.895378] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1146.895383] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1146.895394] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1146.895401] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1146.895408] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1146.895415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1146.895422] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1146.895442] [ 1146.895446] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1146.895453] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295813653 [ 1146.895459] kmemleak: min_count = 1 [ 1146.895463] kmemleak: count = 0 [ 1146.895467] kmemleak: flags = 0x21 [ 1146.895470] kmemleak: checksum = 0 [ 1146.895474] kmemleak: backtrace: [ 1146.895477] pcpu_alloc_noprof+0x87a/0x1170 [ 1146.895492] __percpu_counter_init_many+0x44/0x360 [ 1146.895504] mm_init+0xcac/0x1170 [ 1146.895512] copy_process+0x3ab7/0x73c0 [ 1146.895521] kernel_clone+0xea/0x7f0 [ 1146.895531] __do_sys_clone+0xce/0x120 [ 1146.895541] do_syscall_64+0xbf/0x360 [ 1146.895549] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:12 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) [ 1146.958044] vfat: Unknown parameter 'appraise' 02:01:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:21 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:21 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:01:21 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1155.810287] vfat: Unknown parameter 'appraise' [ 1155.821534] vfat: Unknown parameter 'appraise' [ 1155.845057] vfat: Unknown parameter 'appraise' 02:01:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1155.850998] vfat: Unknown parameter 'appraise' 02:01:21 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1155.865211] kmemleak: Found object by alias at 0x607f1a62a61c [ 1155.865228] CPU: 1 UID: 0 PID: 9358 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1155.865246] Tainted: [W]=WARN [ 1155.865250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1155.865257] Call Trace: [ 1155.865261] [ 1155.865266] dump_stack_lvl+0xca/0x120 [ 1155.865292] __lookup_object+0x94/0xb0 [ 1155.865309] delete_object_full+0x27/0x70 [ 1155.865325] free_percpu+0x30/0x1160 [ 1155.865341] ? arch_uprobe_clear_state+0x16/0x140 [ 1155.865361] futex_hash_free+0x38/0xc0 [ 1155.865375] mmput+0x2d3/0x390 [ 1155.865394] do_exit+0x79d/0x2970 [ 1155.865411] ? __pfx_do_exit+0x10/0x10 [ 1155.865425] ? find_held_lock+0x2b/0x80 [ 1155.865447] ? get_signal+0x835/0x2340 [ 1155.865467] do_group_exit+0xd3/0x2a0 [ 1155.865481] get_signal+0x2315/0x2340 [ 1155.865498] ? put_task_stack+0xd2/0x240 [ 1155.865513] ? __pfx_get_signal+0x10/0x10 [ 1155.865529] ? __schedule+0xe91/0x3590 [ 1155.865549] arch_do_signal_or_restart+0x80/0x790 [ 1155.865566] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1155.865582] ? __x64_sys_futex+0x1c9/0x4d0 [ 1155.865594] ? __x64_sys_futex+0x1d2/0x4d0 [ 1155.865608] ? fput_close_sync+0x114/0x240 [ 1155.865624] ? __pfx___x64_sys_futex+0x10/0x10 [ 1155.865636] ? __pfx_fput_close_sync+0x10/0x10 [ 1155.865651] ? dnotify_flush+0x79/0x4c0 [ 1155.865666] exit_to_user_mode_loop+0x8b/0x110 [ 1155.865680] do_syscall_64+0x2f7/0x360 [ 1155.865691] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1155.865704] RIP: 0033:0x7f61678c2b19 [ 1155.865713] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1155.865725] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1155.865739] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1155.865750] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1155.865760] RBP: 00007f61679d5f60 R08: 0000000000000016 R09: 0000000000000000 [ 1155.865769] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1155.865779] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1155.865797] [ 1155.865801] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1155.865807] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295822562 [ 1155.865814] kmemleak: min_count = 1 [ 1155.865818] kmemleak: count = 0 [ 1155.865822] kmemleak: flags = 0x21 [ 1155.865826] kmemleak: checksum = 0 [ 1155.865829] kmemleak: backtrace: [ 1155.865833] pcpu_alloc_noprof+0x87a/0x1170 [ 1155.865848] __percpu_counter_init_many+0x44/0x360 [ 1155.865861] mm_init+0xcac/0x1170 [ 1155.865869] copy_process+0x3ab7/0x73c0 [ 1155.865879] kernel_clone+0xea/0x7f0 [ 1155.865889] __do_sys_clone+0xce/0x120 [ 1155.865899] do_syscall_64+0xbf/0x360 [ 1155.865907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1155.915317] kmemleak: Found object by alias at 0x607f1a62a618 [ 1155.915330] CPU: 1 UID: 0 PID: 9361 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1155.915347] Tainted: [W]=WARN [ 1155.915351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1155.915358] Call Trace: [ 1155.915362] [ 1155.915366] dump_stack_lvl+0xca/0x120 [ 1155.915385] __lookup_object+0x94/0xb0 [ 1155.915400] delete_object_full+0x27/0x70 [ 1155.915416] free_percpu+0x30/0x1160 [ 1155.915430] ? arch_uprobe_clear_state+0x16/0x140 [ 1155.915453] futex_hash_free+0x38/0xc0 [ 1155.915465] mmput+0x2d3/0x390 [ 1155.915483] do_exit+0x79d/0x2970 [ 1155.915496] ? signal_wake_up_state+0x85/0x120 [ 1155.915511] ? zap_other_threads+0x2b9/0x3a0 [ 1155.915526] ? __pfx_do_exit+0x10/0x10 [ 1155.915539] ? do_group_exit+0x1c3/0x2a0 [ 1155.915553] ? lock_release+0xc8/0x290 [ 1155.915569] do_group_exit+0xd3/0x2a0 [ 1155.915583] __x64_sys_exit_group+0x3e/0x50 [ 1155.915597] x64_sys_call+0x18c5/0x18d0 [ 1155.915612] do_syscall_64+0xbf/0x360 [ 1155.915623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1155.915634] RIP: 0033:0x7ff07166db19 [ 1155.915642] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1155.915647] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1155.915658] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1155.915666] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1155.915673] RBP: 0000000000000000 R08: 0000001b2cf2098c R09: 0000000000000000 [ 1155.915680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1155.915686] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1155.915702] [ 1155.915706] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1155.915712] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295822671 [ 1155.915719] kmemleak: min_count = 1 [ 1155.915723] kmemleak: count = 0 [ 1155.915727] kmemleak: flags = 0x21 [ 1155.915731] kmemleak: checksum = 0 [ 1155.915735] kmemleak: backtrace: [ 1155.915738] pcpu_alloc_noprof+0x87a/0x1170 [ 1155.915753] __percpu_counter_init_many+0x44/0x360 [ 1155.915764] mm_init+0xcac/0x1170 [ 1155.915772] copy_process+0x3ab7/0x73c0 [ 1155.915782] kernel_clone+0xea/0x7f0 [ 1155.915791] __do_sys_clone+0xce/0x120 [ 1155.915801] do_syscall_64+0xbf/0x360 [ 1155.915810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1155.937325] vfat: Unknown parameter 'fsname' 02:01:21 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:01:21 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:01:21 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:21 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1156.000857] vfat: Unknown parameter 'fsname' [ 1156.042355] vfat: Unknown parameter 'appraise' 02:01:30 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:30 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:01:30 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="d0", 0x1}], 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x20000000) 02:01:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:30 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:30 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:01:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1165.030295] vfat: Unknown parameter 'fsname' [ 1165.057645] kmemleak: Found object by alias at 0x607f1a62a618 [ 1165.057661] CPU: 1 UID: 0 PID: 9390 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1165.057679] Tainted: [W]=WARN [ 1165.057683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.057691] Call Trace: [ 1165.057695] [ 1165.057700] dump_stack_lvl+0xca/0x120 [ 1165.057727] __lookup_object+0x94/0xb0 [ 1165.057744] delete_object_full+0x27/0x70 [ 1165.057760] free_percpu+0x30/0x1160 [ 1165.057776] ? arch_uprobe_clear_state+0x16/0x140 [ 1165.057796] futex_hash_free+0x38/0xc0 [ 1165.057810] mmput+0x2d3/0x390 [ 1165.057829] do_exit+0x79d/0x2970 [ 1165.057854] ? signal_wake_up_state+0x85/0x120 [ 1165.057875] ? zap_other_threads+0x2b9/0x3a0 [ 1165.057894] ? __pfx_do_exit+0x10/0x10 [ 1165.057909] ? do_group_exit+0x1c3/0x2a0 [ 1165.057922] ? lock_release+0xc8/0x290 [ 1165.057939] do_group_exit+0xd3/0x2a0 [ 1165.057954] __x64_sys_exit_group+0x3e/0x50 [ 1165.057968] x64_sys_call+0x18c5/0x18d0 [ 1165.057983] do_syscall_64+0xbf/0x360 [ 1165.057996] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.058007] RIP: 0033:0x7ff07166db19 [ 1165.058016] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1165.058021] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1165.058032] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1165.058039] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1165.058047] RBP: 0000000000000000 R08: 0000001b2cf20944 R09: 0000000000000000 [ 1165.058054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1165.058060] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1165.058076] [ 1165.058080] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1165.058087] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295831769 [ 1165.058094] kmemleak: min_count = 1 [ 1165.058097] kmemleak: count = 0 [ 1165.058101] kmemleak: flags = 0x21 [ 1165.058105] kmemleak: checksum = 0 [ 1165.058108] kmemleak: backtrace: [ 1165.058112] pcpu_alloc_noprof+0x87a/0x1170 [ 1165.058127] __percpu_counter_init_many+0x44/0x360 [ 1165.058140] mm_init+0xcac/0x1170 [ 1165.058148] copy_process+0x3ab7/0x73c0 [ 1165.058157] kernel_clone+0xea/0x7f0 [ 1165.058167] __do_sys_clone+0xce/0x120 [ 1165.058177] do_syscall_64+0xbf/0x360 [ 1165.058185] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.072295] vfat: Unknown parameter 'appraise' [ 1165.092943] vfat: Unknown parameter 'fsname' 02:01:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) 02:01:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:30 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:01:30 executing program 4: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}}, 0x80) [ 1165.181274] kmemleak: Found object by alias at 0x607f1a62a618 [ 1165.181292] CPU: 1 UID: 0 PID: 9407 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1165.181310] Tainted: [W]=WARN [ 1165.181314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.181322] Call Trace: [ 1165.181326] [ 1165.181330] dump_stack_lvl+0xca/0x120 [ 1165.181354] __lookup_object+0x94/0xb0 [ 1165.181371] delete_object_full+0x27/0x70 [ 1165.181387] free_percpu+0x30/0x1160 [ 1165.181403] ? arch_uprobe_clear_state+0x16/0x140 [ 1165.181422] futex_hash_free+0x38/0xc0 [ 1165.181441] mmput+0x2d3/0x390 [ 1165.181460] do_exit+0x79d/0x2970 [ 1165.181473] ? lock_release+0xc8/0x290 [ 1165.181490] ? __pfx_do_exit+0x10/0x10 [ 1165.181503] ? find_held_lock+0x2b/0x80 [ 1165.181521] ? get_signal+0x835/0x2340 [ 1165.181540] do_group_exit+0xd3/0x2a0 [ 1165.181555] get_signal+0x2315/0x2340 [ 1165.181572] ? __fget_files+0x203/0x3b0 [ 1165.181587] ? __pfx_get_signal+0x10/0x10 [ 1165.181603] ? do_futex+0x135/0x370 [ 1165.181616] ? __pfx_do_futex+0x10/0x10 [ 1165.181631] arch_do_signal_or_restart+0x80/0x790 [ 1165.181649] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1165.181665] ? __x64_sys_futex+0x1c9/0x4d0 [ 1165.181676] ? __x64_sys_futex+0x1d2/0x4d0 [ 1165.181689] ? __sys_socket+0x9f/0x260 [ 1165.181704] ? __pfx___x64_sys_futex+0x10/0x10 [ 1165.181722] exit_to_user_mode_loop+0x8b/0x110 [ 1165.181735] do_syscall_64+0x2f7/0x360 [ 1165.181747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.181759] RIP: 0033:0x7ff07166db19 [ 1165.181768] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1165.181773] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1165.181784] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1165.181792] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1165.181799] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1165.181806] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1165.181813] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1165.181829] [ 1165.181832] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1165.181847] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295831945 [ 1165.181856] kmemleak: min_count = 1 [ 1165.181861] kmemleak: count = 0 [ 1165.181865] kmemleak: flags = 0x21 [ 1165.181870] kmemleak: checksum = 0 [ 1165.181875] kmemleak: backtrace: [ 1165.181879] pcpu_alloc_noprof+0x87a/0x1170 [ 1165.181898] __percpu_counter_init_many+0x44/0x360 [ 1165.181915] mm_init+0xcac/0x1170 [ 1165.181925] copy_process+0x3ab7/0x73c0 [ 1165.181938] kernel_clone+0xea/0x7f0 [ 1165.181948] __do_sys_clone+0xce/0x120 [ 1165.181958] do_syscall_64+0xbf/0x360 [ 1165.181966] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.190902] kmemleak: Found object by alias at 0x607f1a62a61c [ 1165.190944] CPU: 0 UID: 0 PID: 9392 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1165.190979] Tainted: [W]=WARN [ 1165.190986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.190999] Call Trace: [ 1165.191006] [ 1165.191014] dump_stack_lvl+0xca/0x120 [ 1165.191057] __lookup_object+0x94/0xb0 [ 1165.191088] delete_object_full+0x27/0x70 [ 1165.191119] free_percpu+0x30/0x1160 [ 1165.191149] ? arch_uprobe_clear_state+0x16/0x140 [ 1165.191187] futex_hash_free+0x38/0xc0 [ 1165.191214] mmput+0x2d3/0x390 [ 1165.191249] do_exit+0x79d/0x2970 [ 1165.191275] ? signal_wake_up_state+0x85/0x120 [ 1165.191305] ? zap_other_threads+0x2b9/0x3a0 [ 1165.191335] ? __pfx_do_exit+0x10/0x10 [ 1165.191360] ? do_group_exit+0x1c3/0x2a0 [ 1165.191386] ? lock_release+0xc8/0x290 [ 1165.191419] do_group_exit+0xd3/0x2a0 [ 1165.191447] __x64_sys_exit_group+0x3e/0x50 [ 1165.191474] x64_sys_call+0x18c5/0x18d0 [ 1165.191503] do_syscall_64+0xbf/0x360 [ 1165.191526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.191547] RIP: 0033:0x7f61678c2b19 [ 1165.191564] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1165.191574] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1165.191596] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1165.191610] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1165.191624] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1165.191638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1165.191650] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1165.191681] [ 1165.191688] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1165.191701] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295831945 [ 1165.191715] kmemleak: min_count = 1 [ 1165.191722] kmemleak: count = 0 [ 1165.191729] kmemleak: flags = 0x21 [ 1165.191737] kmemleak: checksum = 0 [ 1165.191744] kmemleak: backtrace: [ 1165.191750] pcpu_alloc_noprof+0x87a/0x1170 [ 1165.191779] __percpu_counter_init_many+0x44/0x360 [ 1165.191803] mm_init+0xcac/0x1170 [ 1165.191819] copy_process+0x3ab7/0x73c0 [ 1165.191838] kernel_clone+0xea/0x7f0 [ 1165.191857] __do_sys_clone+0xce/0x120 [ 1165.191877] do_syscall_64+0xbf/0x360 [ 1165.191893] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:30 executing program 5: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r1 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:01:30 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:01:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}}, 0x0) 02:01:30 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1165.333091] vfat: Unknown parameter 'fsname' 02:01:30 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x14}, 0x14}}, 0x80) [ 1165.364044] vfat: Unknown parameter 'appraise' [ 1165.388852] vfat: Unknown parameter 'appraise' [ 1165.425917] kmemleak: Found object by alias at 0x607f1a62a618 [ 1165.425935] CPU: 1 UID: 0 PID: 9429 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1165.425953] Tainted: [W]=WARN [ 1165.425957] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.425966] Call Trace: [ 1165.425970] [ 1165.425974] dump_stack_lvl+0xca/0x120 [ 1165.426001] __lookup_object+0x94/0xb0 [ 1165.426018] delete_object_full+0x27/0x70 [ 1165.426034] free_percpu+0x30/0x1160 [ 1165.426051] ? arch_uprobe_clear_state+0x16/0x140 [ 1165.426071] futex_hash_free+0x38/0xc0 [ 1165.426085] mmput+0x2d3/0x390 [ 1165.426104] do_exit+0x79d/0x2970 [ 1165.426117] ? lock_release+0xc8/0x290 [ 1165.426135] ? __pfx_do_exit+0x10/0x10 [ 1165.426148] ? find_held_lock+0x2b/0x80 [ 1165.426165] ? get_signal+0x835/0x2340 [ 1165.426185] do_group_exit+0xd3/0x2a0 [ 1165.426200] get_signal+0x2315/0x2340 [ 1165.426221] ? __pfx_get_signal+0x10/0x10 [ 1165.426237] ? do_futex+0x135/0x370 [ 1165.426251] ? __pfx_do_futex+0x10/0x10 [ 1165.426266] arch_do_signal_or_restart+0x80/0x790 [ 1165.426284] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1165.426299] ? __x64_sys_futex+0x1c9/0x4d0 [ 1165.426311] ? __x64_sys_futex+0x1d2/0x4d0 [ 1165.426326] ? __pfx___x64_sys_futex+0x10/0x10 [ 1165.426344] exit_to_user_mode_loop+0x8b/0x110 [ 1165.426357] do_syscall_64+0x2f7/0x360 [ 1165.426369] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.426381] RIP: 0033:0x7ff07166db19 [ 1165.426390] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1165.426395] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1165.426406] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1165.426414] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1165.426421] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1165.426428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1165.426435] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1165.426451] [ 1165.426455] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1165.426462] kmemleak: comm "kworker/u10:0", pid 9430, jiffies 4295832195 [ 1165.426469] kmemleak: min_count = 1 [ 1165.426473] kmemleak: count = 0 [ 1165.426476] kmemleak: flags = 0x21 [ 1165.426480] kmemleak: checksum = 0 [ 1165.426484] kmemleak: backtrace: [ 1165.426487] pcpu_alloc_noprof+0x87a/0x1170 [ 1165.426502] __percpu_counter_init_many+0x44/0x360 [ 1165.426515] mm_init+0xcac/0x1170 [ 1165.426523] mm_alloc+0xa0/0xd0 [ 1165.426531] alloc_bprm+0x2e3/0x6e0 [ 1165.426547] kernel_execve+0xb0/0x3d0 [ 1165.426556] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1165.426572] ret_from_fork+0x34b/0x430 [ 1165.426588] ret_from_fork_asm+0x1a/0x30 [ 1165.442338] kmemleak: Found object by alias at 0x607f1a62a61c [ 1165.442373] CPU: 0 UID: 0 PID: 9421 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1165.442408] Tainted: [W]=WARN [ 1165.442415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.442428] Call Trace: [ 1165.442442] [ 1165.442451] dump_stack_lvl+0xca/0x120 [ 1165.442493] __lookup_object+0x94/0xb0 [ 1165.442524] delete_object_full+0x27/0x70 [ 1165.442555] free_percpu+0x30/0x1160 [ 1165.442585] ? arch_uprobe_clear_state+0x16/0x140 [ 1165.442623] futex_hash_free+0x38/0xc0 [ 1165.442649] mmput+0x2d3/0x390 [ 1165.442684] do_exit+0x79d/0x2970 [ 1165.442710] ? signal_wake_up_state+0x85/0x120 [ 1165.442740] ? zap_other_threads+0x2b9/0x3a0 [ 1165.442770] ? __pfx_do_exit+0x10/0x10 [ 1165.442795] ? do_group_exit+0x1c3/0x2a0 [ 1165.442821] ? lock_release+0xc8/0x290 [ 1165.442853] do_group_exit+0xd3/0x2a0 [ 1165.442882] __x64_sys_exit_group+0x3e/0x50 [ 1165.442909] x64_sys_call+0x18c5/0x18d0 [ 1165.442939] do_syscall_64+0xbf/0x360 [ 1165.442961] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.442982] RIP: 0033:0x7f61678c2b19 [ 1165.443000] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1165.443009] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1165.443031] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1165.443046] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1165.443060] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1165.443073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1165.443086] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1165.443116] [ 1165.443123] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1165.443136] kmemleak: comm "kworker/u10:0", pid 9430, jiffies 4295832195 [ 1165.443150] kmemleak: min_count = 1 [ 1165.443157] kmemleak: count = 0 [ 1165.443165] kmemleak: flags = 0x21 [ 1165.443172] kmemleak: checksum = 0 [ 1165.443179] kmemleak: backtrace: [ 1165.443185] pcpu_alloc_noprof+0x87a/0x1170 [ 1165.443214] __percpu_counter_init_many+0x44/0x360 [ 1165.443238] mm_init+0xcac/0x1170 [ 1165.443254] mm_alloc+0xa0/0xd0 [ 1165.443271] alloc_bprm+0x2e3/0x6e0 [ 1165.443301] kernel_execve+0xb0/0x3d0 [ 1165.443319] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1165.443348] ret_from_fork+0x34b/0x430 [ 1165.443380] ret_from_fork_asm+0x1a/0x30 02:01:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:38 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:38 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:38 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:38 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:01:38 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:01:38 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:01:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1173.516211] vfat: Unknown parameter 'appraise' [ 1173.521247] vfat: Unknown parameter 'appraise' [ 1173.548414] kmemleak: Found object by alias at 0x607f1a62a61c [ 1173.548436] CPU: 0 UID: 0 PID: 9444 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1173.548454] Tainted: [W]=WARN [ 1173.548458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1173.548465] Call Trace: [ 1173.548469] [ 1173.548474] dump_stack_lvl+0xca/0x120 [ 1173.548500] __lookup_object+0x94/0xb0 [ 1173.548517] delete_object_full+0x27/0x70 [ 1173.548533] free_percpu+0x30/0x1160 [ 1173.548550] ? arch_uprobe_clear_state+0x16/0x140 [ 1173.548570] futex_hash_free+0x38/0xc0 [ 1173.548584] mmput+0x2d3/0x390 [ 1173.548602] do_exit+0x79d/0x2970 [ 1173.548620] ? __pfx_do_exit+0x10/0x10 [ 1173.548633] ? find_held_lock+0x2b/0x80 [ 1173.548651] ? get_signal+0x835/0x2340 [ 1173.548671] do_group_exit+0xd3/0x2a0 [ 1173.548685] get_signal+0x2315/0x2340 [ 1173.548702] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1173.548719] ? __pfx_get_signal+0x10/0x10 [ 1173.548734] ? __schedule+0xe91/0x3590 [ 1173.548754] arch_do_signal_or_restart+0x80/0x790 [ 1173.548772] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1173.548787] ? __x64_sys_futex+0x1c9/0x4d0 [ 1173.548800] ? __x64_sys_futex+0x1d2/0x4d0 [ 1173.548817] ? fput_close_sync+0x114/0x240 [ 1173.548840] ? __pfx___x64_sys_futex+0x10/0x10 [ 1173.548853] ? __pfx_fput_close_sync+0x10/0x10 [ 1173.548867] ? dnotify_flush+0x79/0x4c0 [ 1173.548883] exit_to_user_mode_loop+0x8b/0x110 [ 1173.548896] do_syscall_64+0x2f7/0x360 [ 1173.548908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.548920] RIP: 0033:0x7f61678c2b19 [ 1173.548929] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1173.548934] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1173.548945] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1173.548953] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1173.548960] RBP: 00007f61679d5f60 R08: 0000000000000016 R09: 0000000000000000 [ 1173.548967] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1173.548974] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1173.548989] [ 1173.548993] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1173.549000] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295840267 [ 1173.549007] kmemleak: min_count = 1 [ 1173.549010] kmemleak: count = 0 [ 1173.549014] kmemleak: flags = 0x21 [ 1173.549018] kmemleak: checksum = 0 [ 1173.549021] kmemleak: backtrace: [ 1173.549025] pcpu_alloc_noprof+0x87a/0x1170 [ 1173.549039] __percpu_counter_init_many+0x44/0x360 [ 1173.549052] mm_init+0xcac/0x1170 [ 1173.549060] copy_process+0x3ab7/0x73c0 [ 1173.549070] kernel_clone+0xea/0x7f0 [ 1173.549080] __do_sys_clone+0xce/0x120 [ 1173.549089] do_syscall_64+0xbf/0x360 [ 1173.549098] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:39 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:39 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1173.586943] vfat: Unknown parameter 'appraise' [ 1173.590123] vfat: Unknown parameter 'fsname' 02:01:39 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, 0x0, 0x20000000) [ 1173.659415] kmemleak: Found object by alias at 0x607f1a62a618 [ 1173.659452] CPU: 1 UID: 0 PID: 9449 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1173.659486] Tainted: [W]=WARN [ 1173.659493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1173.659505] Call Trace: [ 1173.659512] [ 1173.659520] dump_stack_lvl+0xca/0x120 [ 1173.659562] __lookup_object+0x94/0xb0 [ 1173.659591] delete_object_full+0x27/0x70 [ 1173.659620] free_percpu+0x30/0x1160 [ 1173.659649] ? arch_uprobe_clear_state+0x16/0x140 [ 1173.659684] futex_hash_free+0x38/0xc0 [ 1173.659709] mmput+0x2d3/0x390 [ 1173.659742] do_exit+0x79d/0x2970 [ 1173.659766] ? signal_wake_up_state+0x85/0x120 [ 1173.659794] ? zap_other_threads+0x2b9/0x3a0 [ 1173.659822] ? __pfx_do_exit+0x10/0x10 [ 1173.659845] ? do_group_exit+0x1c3/0x2a0 [ 1173.659869] ? lock_release+0xc8/0x290 [ 1173.659899] do_group_exit+0xd3/0x2a0 [ 1173.659926] __x64_sys_exit_group+0x3e/0x50 [ 1173.659951] x64_sys_call+0x18c5/0x18d0 [ 1173.659978] do_syscall_64+0xbf/0x360 [ 1173.659999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.660020] RIP: 0033:0x7ff07166db19 [ 1173.660036] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1173.660045] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1173.660065] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1173.660078] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1173.660091] RBP: 0000000000000000 R08: 0000001b2cf221b0 R09: 0000000000000000 [ 1173.660104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1173.660116] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1173.660145] [ 1173.660152] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1173.660164] kmemleak: comm "syz-executor.2", pid 284, jiffies 4295840435 [ 1173.660176] kmemleak: min_count = 1 [ 1173.660183] kmemleak: count = 0 [ 1173.660190] kmemleak: flags = 0x21 [ 1173.660197] kmemleak: checksum = 0 [ 1173.660204] kmemleak: backtrace: [ 1173.660209] pcpu_alloc_noprof+0x87a/0x1170 [ 1173.660236] __percpu_counter_init_many+0x44/0x360 [ 1173.660258] mm_init+0xcac/0x1170 [ 1173.660273] copy_process+0x3ab7/0x73c0 [ 1173.660291] kernel_clone+0xea/0x7f0 [ 1173.660309] __do_sys_clone+0xce/0x120 [ 1173.660327] do_syscall_64+0xbf/0x360 [ 1173.660342] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.663815] vfat: Unknown parameter 'appraise' 02:01:39 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:39 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:39 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:39 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) [ 1173.789860] vfat: Unknown parameter 'appraise' 02:01:39 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) [ 1173.829478] vfat: Unknown parameter 'appraise' [ 1173.895761] kmemleak: Found object by alias at 0x607f1a62a618 [ 1173.895790] CPU: 0 UID: 0 PID: 9471 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1173.895822] Tainted: [W]=WARN [ 1173.895829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1173.895841] Call Trace: [ 1173.895848] [ 1173.895856] dump_stack_lvl+0xca/0x120 [ 1173.895899] __lookup_object+0x94/0xb0 [ 1173.895929] delete_object_full+0x27/0x70 [ 1173.895957] free_percpu+0x30/0x1160 [ 1173.895985] ? arch_uprobe_clear_state+0x16/0x140 [ 1173.896020] futex_hash_free+0x38/0xc0 [ 1173.896045] mmput+0x2d3/0x390 [ 1173.896078] do_exit+0x79d/0x2970 [ 1173.896109] ? __pfx_do_exit+0x10/0x10 [ 1173.896134] ? find_held_lock+0x2b/0x80 [ 1173.896165] ? get_signal+0x835/0x2340 [ 1173.896201] do_group_exit+0xd3/0x2a0 [ 1173.896228] get_signal+0x2315/0x2340 [ 1173.896259] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1173.896288] ? __pfx_get_signal+0x10/0x10 [ 1173.896318] ? __schedule+0xe91/0x3590 [ 1173.896353] arch_do_signal_or_restart+0x80/0x790 [ 1173.896383] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1173.896413] ? __x64_sys_futex+0x1c9/0x4d0 [ 1173.896442] ? __x64_sys_futex+0x1d2/0x4d0 [ 1173.896469] ? __pfx___x64_sys_futex+0x10/0x10 [ 1173.896492] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1173.896515] ? xfd_validate_state+0x55/0x180 [ 1173.896552] exit_to_user_mode_loop+0x8b/0x110 [ 1173.896575] do_syscall_64+0x2f7/0x360 [ 1173.896596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.896617] RIP: 0033:0x7ff07166db19 [ 1173.896632] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1173.896642] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1173.896662] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1173.896675] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1173.896688] RBP: 00007ff071780f60 R08: 0000000000000016 R09: 0000000000000000 [ 1173.896700] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1173.896713] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1173.896742] [ 1173.896749] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1173.896761] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295840579 [ 1173.896773] kmemleak: min_count = 1 [ 1173.896780] kmemleak: count = 0 [ 1173.896787] kmemleak: flags = 0x21 [ 1173.896794] kmemleak: checksum = 0 [ 1173.896800] kmemleak: backtrace: [ 1173.896806] pcpu_alloc_noprof+0x87a/0x1170 [ 1173.896833] __percpu_counter_init_many+0x44/0x360 [ 1173.896855] mm_init+0xcac/0x1170 [ 1173.896870] copy_process+0x3ab7/0x73c0 [ 1173.896887] kernel_clone+0xea/0x7f0 [ 1173.896905] __do_sys_clone+0xce/0x120 [ 1173.896923] do_syscall_64+0xbf/0x360 [ 1173.896938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.934796] kmemleak: Found object by alias at 0x607f1a62a61c [ 1173.934827] CPU: 1 UID: 0 PID: 9468 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1173.934860] Tainted: [W]=WARN [ 1173.934867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1173.934881] Call Trace: [ 1173.934888] [ 1173.934896] dump_stack_lvl+0xca/0x120 [ 1173.934937] __lookup_object+0x94/0xb0 [ 1173.934967] delete_object_full+0x27/0x70 [ 1173.934996] free_percpu+0x30/0x1160 [ 1173.935026] ? arch_uprobe_clear_state+0x16/0x140 [ 1173.935062] futex_hash_free+0x38/0xc0 [ 1173.935088] mmput+0x2d3/0x390 [ 1173.935122] do_exit+0x79d/0x2970 [ 1173.935147] ? lock_release+0xc8/0x290 [ 1173.935177] ? __pfx_do_exit+0x10/0x10 [ 1173.935202] ? find_held_lock+0x2b/0x80 [ 1173.935234] ? get_signal+0x835/0x2340 [ 1173.935270] do_group_exit+0xd3/0x2a0 [ 1173.935297] get_signal+0x2315/0x2340 [ 1173.935329] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1173.935359] ? __pfx_get_signal+0x10/0x10 [ 1173.935389] ? do_futex+0x135/0x370 [ 1173.935413] ? __pfx_do_futex+0x10/0x10 [ 1173.935448] arch_do_signal_or_restart+0x80/0x790 [ 1173.935481] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1173.935510] ? __x64_sys_futex+0x1c9/0x4d0 [ 1173.935533] ? __x64_sys_futex+0x1d2/0x4d0 [ 1173.935558] ? fput_close_sync+0x114/0x240 [ 1173.935587] ? __pfx___x64_sys_futex+0x10/0x10 [ 1173.935611] ? __pfx_fput_close_sync+0x10/0x10 [ 1173.935637] ? dnotify_flush+0x79/0x4c0 [ 1173.935656] ? xfd_validate_state+0x55/0x180 [ 1173.935695] exit_to_user_mode_loop+0x8b/0x110 [ 1173.935719] do_syscall_64+0x2f7/0x360 [ 1173.935741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1173.935763] RIP: 0033:0x7f61678c2b19 [ 1173.935778] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1173.935788] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1173.935808] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1173.935823] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1173.935836] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1173.935848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1173.935862] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1173.935891] [ 1173.935898] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1173.935911] kmemleak: comm "syz-executor.0", pid 274, jiffies 4295840579 [ 1173.935924] kmemleak: min_count = 1 [ 1173.935931] kmemleak: count = 0 [ 1173.935938] kmemleak: flags = 0x21 [ 1173.935945] kmemleak: checksum = 0 [ 1173.935952] kmemleak: backtrace: [ 1173.935958] pcpu_alloc_noprof+0x87a/0x1170 [ 1173.935985] __percpu_counter_init_many+0x44/0x360 [ 1173.936009] mm_init+0xcac/0x1170 [ 1173.936023] copy_process+0x3ab7/0x73c0 [ 1173.936042] kernel_clone+0xea/0x7f0 [ 1173.936060] __do_sys_clone+0xce/0x120 [ 1173.936078] do_syscall_64+0xbf/0x360 [ 1173.936094] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:39 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1174.100949] kmemleak: Found object by alias at 0x607f1a62a618 [ 1174.100977] CPU: 1 UID: 0 PID: 9479 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1174.101012] Tainted: [W]=WARN [ 1174.101019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.101032] Call Trace: [ 1174.101039] [ 1174.101047] dump_stack_lvl+0xca/0x120 [ 1174.101090] __lookup_object+0x94/0xb0 [ 1174.101120] delete_object_full+0x27/0x70 [ 1174.101149] free_percpu+0x30/0x1160 [ 1174.101178] ? arch_uprobe_clear_state+0x16/0x140 [ 1174.101213] futex_hash_free+0x38/0xc0 [ 1174.101238] mmput+0x2d3/0x390 [ 1174.101271] do_exit+0x79d/0x2970 [ 1174.101296] ? lock_release+0xc8/0x290 [ 1174.101326] ? __pfx_do_exit+0x10/0x10 [ 1174.101351] ? find_held_lock+0x2b/0x80 [ 1174.101382] ? get_signal+0x835/0x2340 [ 1174.101418] do_group_exit+0xd3/0x2a0 [ 1174.101453] get_signal+0x2315/0x2340 [ 1174.101494] ? __pfx_get_signal+0x10/0x10 [ 1174.101524] ? do_futex+0x135/0x370 [ 1174.101549] ? __pfx_do_futex+0x10/0x10 [ 1174.101576] arch_do_signal_or_restart+0x80/0x790 [ 1174.101608] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1174.101638] ? __x64_sys_futex+0x1c9/0x4d0 [ 1174.101660] ? __x64_sys_futex+0x1d2/0x4d0 [ 1174.101687] ? __pfx___x64_sys_futex+0x10/0x10 [ 1174.101722] exit_to_user_mode_loop+0x8b/0x110 [ 1174.101744] do_syscall_64+0x2f7/0x360 [ 1174.101766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1174.101788] RIP: 0033:0x7ff07166db19 [ 1174.101804] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1174.101814] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1174.101834] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1174.101849] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1174.101862] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1174.101875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1174.101888] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1174.101918] [ 1174.101924] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1174.101937] kmemleak: comm "syz-executor.3", pid 278, jiffies 4295840831 [ 1174.101960] kmemleak: min_count = 1 [ 1174.101967] kmemleak: count = 0 [ 1174.101974] kmemleak: flags = 0x21 [ 1174.101981] kmemleak: checksum = 0 [ 1174.101988] kmemleak: backtrace: [ 1174.101995] pcpu_alloc_noprof+0x87a/0x1170 [ 1174.102022] __percpu_counter_init_many+0x44/0x360 [ 1174.102044] mm_init+0xcac/0x1170 [ 1174.102059] copy_process+0x3ab7/0x73c0 [ 1174.102077] kernel_clone+0xea/0x7f0 [ 1174.102095] __do_sys_clone+0xce/0x120 [ 1174.102114] do_syscall_64+0xbf/0x360 [ 1174.102129] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:49 executing program 6: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:01:49 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:49 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:49 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:49 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:01:49 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1183.719057] vfat: Unknown parameter 'appraise' [ 1183.722322] vfat: Unknown parameter 'appraise' 02:01:49 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:49 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:49 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1183.876148] kmemleak: Found object by alias at 0x607f1a62a61c [ 1183.876181] CPU: 0 UID: 0 PID: 9490 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1183.876215] Tainted: [W]=WARN [ 1183.876222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1183.876235] Call Trace: [ 1183.876241] [ 1183.876250] dump_stack_lvl+0xca/0x120 [ 1183.876291] __lookup_object+0x94/0xb0 [ 1183.876320] delete_object_full+0x27/0x70 [ 1183.876349] free_percpu+0x30/0x1160 [ 1183.876378] ? arch_uprobe_clear_state+0x16/0x140 [ 1183.876414] futex_hash_free+0x38/0xc0 [ 1183.876445] mmput+0x2d3/0x390 [ 1183.876478] do_exit+0x79d/0x2970 [ 1183.876510] ? __pfx_do_exit+0x10/0x10 [ 1183.876535] ? trace_irq_enable.constprop.0+0x26/0x100 [ 1183.876558] ? _raw_spin_unlock_irq+0x23/0x40 [ 1183.876589] do_group_exit+0xd3/0x2a0 [ 1183.876616] __x64_sys_exit_group+0x3e/0x50 [ 1183.876642] x64_sys_call+0x18c5/0x18d0 [ 1183.876669] do_syscall_64+0xbf/0x360 [ 1183.876690] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1183.876710] RIP: 0033:0x7f61678c2b19 [ 1183.876727] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1183.876738] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1183.876761] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1183.876775] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1183.876788] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1183.876801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1183.876813] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1183.876842] [ 1183.876849] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1183.876862] kmemleak: comm "kworker/u10:10", pid 9508, jiffies 4295850628 [ 1183.876875] kmemleak: min_count = 1 [ 1183.876882] kmemleak: count = 0 [ 1183.876888] kmemleak: flags = 0x21 [ 1183.876895] kmemleak: checksum = 0 [ 1183.876902] kmemleak: backtrace: [ 1183.876909] pcpu_alloc_noprof+0x87a/0x1170 [ 1183.876935] __percpu_counter_init_many+0x44/0x360 [ 1183.876958] mm_init+0xcac/0x1170 [ 1183.876973] mm_alloc+0xa0/0xd0 [ 1183.876989] alloc_bprm+0x2e3/0x6e0 [ 1183.877017] kernel_execve+0xb0/0x3d0 [ 1183.877034] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1183.877062] ret_from_fork+0x34b/0x430 [ 1183.877092] ret_from_fork_asm+0x1a/0x30 [ 1183.954374] vfat: Unknown parameter 'appraise' [ 1183.971054] vfat: Unknown parameter 'appraise' 02:01:57 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:01:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:01:57 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) 02:01:57 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:01:57 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:01:57 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:57 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1192.532758] vfat: Unknown parameter 'appraise' 02:01:58 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:01:58 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) [ 1192.572775] vfat: Unknown parameter 'appraise' [ 1192.579635] vfat: Unknown parameter 'appraise' 02:01:58 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1192.636648] kmemleak: Found object by alias at 0x607f1a62a618 [ 1192.636670] CPU: 1 UID: 0 PID: 9531 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1192.636689] Tainted: [W]=WARN [ 1192.636694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.636702] Call Trace: [ 1192.636706] [ 1192.636711] dump_stack_lvl+0xca/0x120 [ 1192.636739] __lookup_object+0x94/0xb0 [ 1192.636756] delete_object_full+0x27/0x70 [ 1192.636773] free_percpu+0x30/0x1160 [ 1192.636790] ? arch_uprobe_clear_state+0x16/0x140 [ 1192.636810] futex_hash_free+0x38/0xc0 [ 1192.636824] mmput+0x2d3/0x390 [ 1192.636843] do_exit+0x79d/0x2970 [ 1192.636856] ? signal_wake_up_state+0x85/0x120 [ 1192.636872] ? zap_other_threads+0x2b9/0x3a0 [ 1192.636888] ? __pfx_do_exit+0x10/0x10 [ 1192.636900] ? do_group_exit+0x1c3/0x2a0 [ 1192.636914] ? lock_release+0xc8/0x290 [ 1192.636931] do_group_exit+0xd3/0x2a0 [ 1192.636946] __x64_sys_exit_group+0x3e/0x50 [ 1192.636960] x64_sys_call+0x18c5/0x18d0 [ 1192.636975] do_syscall_64+0xbf/0x360 [ 1192.636987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.636999] RIP: 0033:0x7ff07166db19 [ 1192.637008] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1192.637013] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1192.637024] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1192.637032] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1192.637040] RBP: 0000000000000000 R08: 0000001b2cf21830 R09: 0000000000000000 [ 1192.637047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.637054] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1192.637070] [ 1192.637074] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1192.637081] kmemleak: comm "syz-executor.6", pid 286, jiffies 4295859282 [ 1192.637088] kmemleak: min_count = 1 [ 1192.637092] kmemleak: count = 0 [ 1192.637096] kmemleak: flags = 0x21 [ 1192.637100] kmemleak: checksum = 0 [ 1192.637104] kmemleak: backtrace: [ 1192.637107] pcpu_alloc_noprof+0x87a/0x1170 [ 1192.637122] __percpu_counter_init_many+0x44/0x360 [ 1192.637135] mm_init+0xcac/0x1170 [ 1192.637143] copy_process+0x3ab7/0x73c0 [ 1192.637154] kernel_clone+0xea/0x7f0 [ 1192.637163] __do_sys_clone+0xce/0x120 [ 1192.637174] do_syscall_64+0xbf/0x360 [ 1192.637182] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.645161] vfat: Unknown parameter 'appraise' [ 1192.674843] kmemleak: Found object by alias at 0x607f1a62a61c [ 1192.674866] CPU: 1 UID: 0 PID: 9530 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1192.674885] Tainted: [W]=WARN [ 1192.674890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.674898] Call Trace: [ 1192.674902] [ 1192.674907] dump_stack_lvl+0xca/0x120 [ 1192.674936] __lookup_object+0x94/0xb0 [ 1192.674953] delete_object_full+0x27/0x70 [ 1192.674970] free_percpu+0x30/0x1160 [ 1192.674987] ? arch_uprobe_clear_state+0x16/0x140 [ 1192.675007] futex_hash_free+0x38/0xc0 [ 1192.675022] mmput+0x2d3/0x390 [ 1192.675041] do_exit+0x79d/0x2970 [ 1192.675055] ? signal_wake_up_state+0x85/0x120 [ 1192.675071] ? zap_other_threads+0x2b9/0x3a0 [ 1192.675087] ? __pfx_do_exit+0x10/0x10 [ 1192.675100] ? do_group_exit+0x1c3/0x2a0 [ 1192.675114] ? lock_release+0xc8/0x290 [ 1192.675131] do_group_exit+0xd3/0x2a0 [ 1192.675146] __x64_sys_exit_group+0x3e/0x50 [ 1192.675161] x64_sys_call+0x18c5/0x18d0 [ 1192.675176] do_syscall_64+0xbf/0x360 [ 1192.675188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.675200] RIP: 0033:0x7f61678c2b19 [ 1192.675210] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1192.675215] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1192.675227] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1192.675235] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1192.675243] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1192.675250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.675258] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1192.675274] [ 1192.675277] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1192.675286] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295859436 [ 1192.675294] kmemleak: min_count = 1 [ 1192.675298] kmemleak: count = 0 [ 1192.675303] kmemleak: flags = 0x21 [ 1192.675308] kmemleak: checksum = 0 [ 1192.675312] kmemleak: backtrace: [ 1192.675315] pcpu_alloc_noprof+0x87a/0x1170 [ 1192.675330] __percpu_counter_init_many+0x44/0x360 [ 1192.675344] mm_init+0xcac/0x1170 [ 1192.675352] copy_process+0x3ab7/0x73c0 [ 1192.675362] kernel_clone+0xea/0x7f0 [ 1192.675372] __do_sys_clone+0xce/0x120 [ 1192.675382] do_syscall_64+0xbf/0x360 [ 1192.675391] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:01:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 02:01:58 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:01:58 executing program 4: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:01:58 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1192.737733] vfat: Unknown parameter 'appraise' 02:01:58 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1192.800993] kmemleak: Found object by alias at 0x607f1a62a618 [ 1192.801012] CPU: 1 UID: 0 PID: 9552 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1192.801031] Tainted: [W]=WARN [ 1192.801035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.801043] Call Trace: [ 1192.801047] [ 1192.801052] dump_stack_lvl+0xca/0x120 [ 1192.801080] __lookup_object+0x94/0xb0 [ 1192.801098] delete_object_full+0x27/0x70 [ 1192.801114] free_percpu+0x30/0x1160 [ 1192.801131] ? arch_uprobe_clear_state+0x16/0x140 [ 1192.801152] futex_hash_free+0x38/0xc0 [ 1192.801166] mmput+0x2d3/0x390 [ 1192.801186] do_exit+0x79d/0x2970 [ 1192.801199] ? lock_release+0xc8/0x290 [ 1192.801216] ? __pfx_do_exit+0x10/0x10 [ 1192.801230] ? find_held_lock+0x2b/0x80 [ 1192.801248] ? get_signal+0x835/0x2340 [ 1192.801268] do_group_exit+0xd3/0x2a0 [ 1192.801283] get_signal+0x2315/0x2340 [ 1192.801301] ? __fget_files+0x203/0x3b0 [ 1192.801316] ? __pfx_get_signal+0x10/0x10 [ 1192.801333] ? do_futex+0x135/0x370 [ 1192.801346] ? __pfx_do_futex+0x10/0x10 [ 1192.801362] arch_do_signal_or_restart+0x80/0x790 [ 1192.801380] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1192.801397] ? __x64_sys_futex+0x1c9/0x4d0 [ 1192.801409] ? __x64_sys_futex+0x1d2/0x4d0 [ 1192.801422] ? __sys_socket+0x9f/0x260 [ 1192.801442] ? __pfx___x64_sys_futex+0x10/0x10 [ 1192.801455] ? xfd_validate_state+0x55/0x180 [ 1192.801477] exit_to_user_mode_loop+0x8b/0x110 [ 1192.801490] do_syscall_64+0x2f7/0x360 [ 1192.801502] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.801514] RIP: 0033:0x7ff07166db19 [ 1192.801524] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1192.801529] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1192.801541] RAX: fffffffffffffe00 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1192.801549] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff071780f68 [ 1192.801556] RBP: 00007ff071780f60 R08: 0000000000000000 R09: 0000000000000000 [ 1192.801563] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff071780f6c [ 1192.801570] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1192.801585] [ 1192.801589] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1192.801596] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295859569 [ 1192.801603] kmemleak: min_count = 1 [ 1192.801607] kmemleak: count = 0 [ 1192.801611] kmemleak: flags = 0x21 [ 1192.801614] kmemleak: checksum = 0 [ 1192.801618] kmemleak: backtrace: [ 1192.801622] pcpu_alloc_noprof+0x87a/0x1170 [ 1192.801637] __percpu_counter_init_many+0x44/0x360 [ 1192.801650] mm_init+0xcac/0x1170 [ 1192.801658] copy_process+0x3ab7/0x73c0 [ 1192.801668] kernel_clone+0xea/0x7f0 [ 1192.801678] __do_sys_clone+0xce/0x120 [ 1192.801687] do_syscall_64+0xbf/0x360 [ 1192.801696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.850816] vfat: Unknown parameter 'appraise' [ 1192.881298] kmemleak: Found object by alias at 0x607f1a62a61c [ 1192.881316] CPU: 1 UID: 0 PID: 9555 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1192.881334] Tainted: [W]=WARN [ 1192.881338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.881346] Call Trace: [ 1192.881350] [ 1192.881354] dump_stack_lvl+0xca/0x120 [ 1192.881380] __lookup_object+0x94/0xb0 [ 1192.881397] delete_object_full+0x27/0x70 [ 1192.881413] free_percpu+0x30/0x1160 [ 1192.881429] ? arch_uprobe_clear_state+0x16/0x140 [ 1192.881453] futex_hash_free+0x38/0xc0 [ 1192.881467] mmput+0x2d3/0x390 [ 1192.881486] do_exit+0x79d/0x2970 [ 1192.881500] ? lock_release+0xc8/0x290 [ 1192.881517] ? __pfx_do_exit+0x10/0x10 [ 1192.881531] ? find_held_lock+0x2b/0x80 [ 1192.881548] ? get_signal+0x835/0x2340 [ 1192.881568] do_group_exit+0xd3/0x2a0 [ 1192.881583] get_signal+0x2315/0x2340 [ 1192.881602] ? __call_rcu_common.constprop.0+0x4c1/0x960 [ 1192.881619] ? __pfx_get_signal+0x10/0x10 [ 1192.881635] ? do_futex+0x135/0x370 [ 1192.881649] ? __pfx_do_futex+0x10/0x10 [ 1192.881664] arch_do_signal_or_restart+0x80/0x790 [ 1192.881682] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1192.881698] ? __x64_sys_futex+0x1c9/0x4d0 [ 1192.881710] ? __x64_sys_futex+0x1d2/0x4d0 [ 1192.881724] ? fput_close_sync+0x114/0x240 [ 1192.881741] ? __pfx___x64_sys_futex+0x10/0x10 [ 1192.881753] ? __pfx_fput_close_sync+0x10/0x10 [ 1192.881768] ? dnotify_flush+0x79/0x4c0 [ 1192.881784] exit_to_user_mode_loop+0x8b/0x110 [ 1192.881797] do_syscall_64+0x2f7/0x360 [ 1192.881809] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1192.881821] RIP: 0033:0x7f61678c2b19 [ 1192.881829] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1192.881835] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1192.881846] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1192.881854] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1192.881861] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1192.881868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1192.881875] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1192.881890] [ 1192.881895] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1192.881902] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295859569 [ 1192.881908] kmemleak: min_count = 1 [ 1192.881912] kmemleak: count = 0 [ 1192.881916] kmemleak: flags = 0x21 [ 1192.881920] kmemleak: checksum = 0 [ 1192.881924] kmemleak: backtrace: [ 1192.881927] pcpu_alloc_noprof+0x87a/0x1170 [ 1192.881942] __percpu_counter_init_many+0x44/0x360 [ 1192.881956] mm_init+0xcac/0x1170 [ 1192.881963] copy_process+0x3ab7/0x73c0 [ 1192.881973] kernel_clone+0xea/0x7f0 [ 1192.881983] __do_sys_clone+0xce/0x120 [ 1192.881993] do_syscall_64+0xbf/0x360 [ 1192.882001] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:02:07 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:07 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:02:07 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 3: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) 02:02:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 4: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1201.715117] vfat: Unknown parameter 'fsname' [ 1201.721823] vfat: Unknown parameter 'appraise' [ 1201.741848] kmemleak: Found object by alias at 0x607f1a62a61c [ 1201.741870] CPU: 0 UID: 0 PID: 9563 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1201.741899] Tainted: [W]=WARN [ 1201.741904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.741915] Call Trace: [ 1201.741921] [ 1201.741928] dump_stack_lvl+0xca/0x120 [ 1201.741961] __lookup_object+0x94/0xb0 [ 1201.741985] delete_object_full+0x27/0x70 [ 1201.742009] free_percpu+0x30/0x1160 [ 1201.742033] ? arch_uprobe_clear_state+0x16/0x140 [ 1201.742063] futex_hash_free+0x38/0xc0 [ 1201.742083] mmput+0x2d3/0x390 [ 1201.742111] do_exit+0x79d/0x2970 [ 1201.742131] ? signal_wake_up_state+0x85/0x120 [ 1201.742154] ? zap_other_threads+0x2b9/0x3a0 [ 1201.742178] ? __pfx_do_exit+0x10/0x10 [ 1201.742197] ? do_group_exit+0x1c3/0x2a0 [ 1201.742217] ? lock_release+0xc8/0x290 [ 1201.742242] do_group_exit+0xd3/0x2a0 [ 1201.742264] __x64_sys_exit_group+0x3e/0x50 [ 1201.742284] x64_sys_call+0x18c5/0x18d0 [ 1201.742321] do_syscall_64+0xbf/0x360 [ 1201.742339] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.742356] RIP: 0033:0x7f61678c2b19 [ 1201.742369] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1201.742377] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1201.742394] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1201.742405] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1201.742416] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1201.742427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1201.742442] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1201.742465] [ 1201.742471] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1201.742481] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295868465 [ 1201.742492] kmemleak: min_count = 1 [ 1201.742498] kmemleak: count = 0 [ 1201.742504] kmemleak: flags = 0x21 [ 1201.742510] kmemleak: checksum = 0 [ 1201.742515] kmemleak: backtrace: [ 1201.742520] pcpu_alloc_noprof+0x87a/0x1170 [ 1201.742543] __percpu_counter_init_many+0x44/0x360 [ 1201.742562] mm_init+0xcac/0x1170 [ 1201.742574] copy_process+0x3ab7/0x73c0 [ 1201.742589] kernel_clone+0xea/0x7f0 [ 1201.742604] __do_sys_clone+0xce/0x120 [ 1201.742619] do_syscall_64+0xbf/0x360 [ 1201.742632] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.790615] vfat: Unknown parameter 'appraise' 02:02:07 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:07 executing program 4: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:02:07 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1201.880334] kmemleak: Found object by alias at 0x607f1a62a618 [ 1201.880360] CPU: 0 UID: 0 PID: 9575 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1201.880387] Tainted: [W]=WARN [ 1201.880393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.880404] Call Trace: [ 1201.880409] [ 1201.880416] dump_stack_lvl+0xca/0x120 [ 1201.880460] __lookup_object+0x94/0xb0 [ 1201.880485] delete_object_full+0x27/0x70 [ 1201.880508] free_percpu+0x30/0x1160 [ 1201.880532] ? arch_uprobe_clear_state+0x16/0x140 [ 1201.880561] futex_hash_free+0x38/0xc0 [ 1201.880581] mmput+0x2d3/0x390 [ 1201.880609] do_exit+0x79d/0x2970 [ 1201.880629] ? signal_wake_up_state+0x85/0x120 [ 1201.880654] ? zap_other_threads+0x2b9/0x3a0 [ 1201.880678] ? __pfx_do_exit+0x10/0x10 [ 1201.880696] ? do_group_exit+0x1c3/0x2a0 [ 1201.880717] ? lock_release+0xc8/0x290 [ 1201.880741] do_group_exit+0xd3/0x2a0 [ 1201.880763] __x64_sys_exit_group+0x3e/0x50 [ 1201.880784] x64_sys_call+0x18c5/0x18d0 [ 1201.880807] do_syscall_64+0xbf/0x360 [ 1201.880832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.880856] RIP: 0033:0x7ff07166db19 [ 1201.880870] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1201.880878] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1201.880895] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1201.880906] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1201.880917] RBP: 0000000000000000 R08: 0000001b2cf2001c R09: 0000000000000000 [ 1201.880928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1201.880938] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1201.880962] [ 1201.880968] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1201.880978] kmemleak: comm "syz-executor.7", pid 283, jiffies 4295868465 [ 1201.880989] kmemleak: min_count = 1 [ 1201.880995] kmemleak: count = 0 [ 1201.881000] kmemleak: flags = 0x21 [ 1201.881006] kmemleak: checksum = 0 [ 1201.881012] kmemleak: backtrace: [ 1201.881016] pcpu_alloc_noprof+0x87a/0x1170 [ 1201.881039] __percpu_counter_init_many+0x44/0x360 [ 1201.881058] mm_init+0xcac/0x1170 [ 1201.881069] copy_process+0x3ab7/0x73c0 [ 1201.881084] kernel_clone+0xea/0x7f0 [ 1201.881099] __do_sys_clone+0xce/0x120 [ 1201.881114] do_syscall_64+0xbf/0x360 [ 1201.881127] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:02:07 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:02:07 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:07 executing program 3: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) [ 1202.043223] vfat: Unknown parameter 'fsname' [ 1202.047068] vfat: Unknown parameter 'appraise' 02:02:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:16 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:16 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:16 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:02:16 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:02:16 executing program 3: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) 02:02:16 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:16 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1211.118368] vfat: Unknown parameter 'appraise' 02:02:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:16 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) [ 1211.164739] vfat: Unknown parameter 'fsname' 02:02:16 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:16 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1211.220931] vfat: Unknown parameter 'appraise' [ 1211.242601] kmemleak: Found object by alias at 0x607f1a62a618 [ 1211.242617] CPU: 1 UID: 0 PID: 9626 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1211.242636] Tainted: [W]=WARN [ 1211.242640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.242647] Call Trace: [ 1211.242651] [ 1211.242656] dump_stack_lvl+0xca/0x120 [ 1211.242682] __lookup_object+0x94/0xb0 [ 1211.242699] delete_object_full+0x27/0x70 [ 1211.242715] free_percpu+0x30/0x1160 [ 1211.242731] ? arch_uprobe_clear_state+0x16/0x140 [ 1211.242755] futex_hash_free+0x38/0xc0 [ 1211.242774] mmput+0x2d3/0x390 [ 1211.242792] do_exit+0x79d/0x2970 [ 1211.242810] ? __pfx_do_exit+0x10/0x10 [ 1211.242824] ? find_held_lock+0x2b/0x80 [ 1211.242842] ? get_signal+0x835/0x2340 [ 1211.242861] do_group_exit+0xd3/0x2a0 [ 1211.242876] get_signal+0x2315/0x2340 [ 1211.242893] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1211.242910] ? __pfx_get_signal+0x10/0x10 [ 1211.242926] ? __schedule+0xe91/0x3590 [ 1211.242946] arch_do_signal_or_restart+0x80/0x790 [ 1211.242964] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1211.242980] ? __x64_sys_futex+0x1c9/0x4d0 [ 1211.242993] ? __x64_sys_futex+0x1d2/0x4d0 [ 1211.243006] ? __sys_socket+0x9f/0x260 [ 1211.243021] ? __pfx___x64_sys_futex+0x10/0x10 [ 1211.243035] ? xfd_validate_state+0x55/0x180 [ 1211.243055] exit_to_user_mode_loop+0x8b/0x110 [ 1211.243069] do_syscall_64+0x2f7/0x360 [ 1211.243081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1211.243093] RIP: 0033:0x7ff07166db19 [ 1211.243102] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1211.243107] RSP: 002b:00007ff06ebe3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1211.243119] RAX: 0000000000000001 RBX: 00007ff071780f68 RCX: 00007ff07166db19 [ 1211.243127] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff071780f6c [ 1211.243134] RBP: 00007ff071780f60 R08: 0000000000000009 R09: 0000000000000000 [ 1211.243141] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff071780f6c [ 1211.243149] R13: 00007ffdf74fc21f R14: 00007ff06ebe3300 R15: 0000000000022000 [ 1211.243165] [ 1211.243169] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1211.243175] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295877937 [ 1211.243183] kmemleak: min_count = 1 [ 1211.243187] kmemleak: count = 0 [ 1211.243190] kmemleak: flags = 0x21 02:02:16 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1211.243194] kmemleak: checksum = 0 [ 1211.243198] kmemleak: backtrace: [ 1211.243201] pcpu_alloc_noprof+0x87a/0x1170 [ 1211.243216] __percpu_counter_init_many+0x44/0x360 [ 1211.243229] mm_init+0xcac/0x1170 [ 1211.243237] copy_process+0x3ab7/0x73c0 [ 1211.243247] kernel_clone+0xea/0x7f0 [ 1211.243257] __do_sys_clone+0xce/0x120 [ 1211.243267] do_syscall_64+0xbf/0x360 [ 1211.243275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1211.255209] kmemleak: Found object by alias at 0x607f1a62a61c [ 1211.255242] CPU: 0 UID: 0 PID: 9620 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1211.255278] Tainted: [W]=WARN [ 1211.255285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.255299] Call Trace: [ 1211.255306] [ 1211.255315] dump_stack_lvl+0xca/0x120 [ 1211.255360] __lookup_object+0x94/0xb0 [ 1211.255391] delete_object_full+0x27/0x70 [ 1211.255423] free_percpu+0x30/0x1160 [ 1211.255463] ? arch_uprobe_clear_state+0x16/0x140 [ 1211.255501] futex_hash_free+0x38/0xc0 [ 1211.255527] mmput+0x2d3/0x390 [ 1211.255563] do_exit+0x79d/0x2970 [ 1211.255589] ? lock_release+0xc8/0x290 [ 1211.255621] ? __pfx_do_exit+0x10/0x10 [ 1211.255648] ? find_held_lock+0x2b/0x80 [ 1211.255682] ? get_signal+0x835/0x2340 [ 1211.255720] do_group_exit+0xd3/0x2a0 [ 1211.255749] get_signal+0x2315/0x2340 [ 1211.255788] ? __call_rcu_common.constprop.0+0x4c1/0x960 [ 1211.255827] ? __pfx_get_signal+0x10/0x10 [ 1211.255873] ? do_futex+0x135/0x370 [ 1211.255900] ? __pfx_do_futex+0x10/0x10 [ 1211.255930] arch_do_signal_or_restart+0x80/0x790 [ 1211.255964] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1211.255996] ? __x64_sys_futex+0x1c9/0x4d0 [ 1211.256020] ? __x64_sys_futex+0x1d2/0x4d0 [ 1211.256047] ? fput_close_sync+0x114/0x240 [ 1211.256079] ? __pfx___x64_sys_futex+0x10/0x10 [ 1211.256103] ? __pfx_fput_close_sync+0x10/0x10 [ 1211.256132] ? dnotify_flush+0x79/0x4c0 [ 1211.256163] exit_to_user_mode_loop+0x8b/0x110 [ 1211.256187] do_syscall_64+0x2f7/0x360 [ 1211.256211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1211.256234] RIP: 0033:0x7f61678c2b19 [ 1211.256251] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1211.256262] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1211.256285] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1211.256300] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1211.256314] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1211.256328] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1211.256341] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1211.256373] [ 1211.256380] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1211.256394] kmemleak: comm "systemd-udevd", pid 112, jiffies 4295877937 [ 1211.256408] kmemleak: min_count = 1 [ 1211.256416] kmemleak: count = 0 [ 1211.256423] kmemleak: flags = 0x21 [ 1211.256430] kmemleak: checksum = 0 [ 1211.256438] kmemleak: backtrace: [ 1211.256444] pcpu_alloc_noprof+0x87a/0x1170 [ 1211.256473] __percpu_counter_init_many+0x44/0x360 [ 1211.256497] mm_init+0xcac/0x1170 [ 1211.256514] copy_process+0x3ab7/0x73c0 [ 1211.256533] kernel_clone+0xea/0x7f0 [ 1211.256552] __do_sys_clone+0xce/0x120 [ 1211.256572] do_syscall_64+0xbf/0x360 [ 1211.256589] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:02:16 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:02:16 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:16 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:02:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) 02:02:26 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:26 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:02:26 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:26 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:26 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1221.029254] kmemleak: Found object by alias at 0x607f1a62a618 [ 1221.029283] CPU: 1 UID: 0 PID: 9658 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1221.029317] Tainted: [W]=WARN [ 1221.029324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:02:26 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1221.029337] Call Trace: [ 1221.029344] [ 1221.029352] dump_stack_lvl+0xca/0x120 [ 1221.029401] __lookup_object+0x94/0xb0 [ 1221.029431] delete_object_full+0x27/0x70 [ 1221.029460] free_percpu+0x30/0x1160 [ 1221.029489] ? arch_uprobe_clear_state+0x16/0x140 [ 1221.029524] futex_hash_free+0x38/0xc0 [ 1221.029550] mmput+0x2d3/0x390 [ 1221.029583] do_exit+0x79d/0x2970 [ 1221.029608] ? signal_wake_up_state+0x85/0x120 [ 1221.029636] ? zap_other_threads+0x2b9/0x3a0 [ 1221.029665] ? __pfx_do_exit+0x10/0x10 [ 1221.029688] ? do_group_exit+0x1c3/0x2a0 [ 1221.029713] ? lock_release+0xc8/0x290 [ 1221.029743] do_group_exit+0xd3/0x2a0 [ 1221.029770] __x64_sys_exit_group+0x3e/0x50 [ 1221.029796] x64_sys_call+0x18c5/0x18d0 [ 1221.029823] do_syscall_64+0xbf/0x360 [ 1221.029844] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1221.029865] RIP: 0033:0x7ff07166db19 02:02:26 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1221.029881] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1221.029891] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1221.029912] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1221.029926] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1221.029939] RBP: 0000000000000000 R08: 0000001b2cf20960 R09: 0000000000000000 [ 1221.029952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 02:02:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0xa12, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000002940)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002900)={&(0x7f0000002780)={0x148, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 1221.029965] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1221.029994] [ 1221.030000] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1221.030013] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295887681 [ 1221.030025] kmemleak: min_count = 1 [ 1221.030032] kmemleak: count = 0 [ 1221.030039] kmemleak: flags = 0x21 [ 1221.030046] kmemleak: checksum = 0 [ 1221.030053] kmemleak: backtrace: [ 1221.030059] pcpu_alloc_noprof+0x87a/0x1170 [ 1221.030086] __percpu_counter_init_many+0x44/0x360 [ 1221.030110] mm_init+0xcac/0x1170 [ 1221.030124] copy_process+0x3ab7/0x73c0 [ 1221.030143] kernel_clone+0xea/0x7f0 [ 1221.030160] __do_sys_clone+0xce/0x120 [ 1221.030179] do_syscall_64+0xbf/0x360 [ 1221.030194] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1221.041608] kmemleak: Found object by alias at 0x607f1a62a61c [ 1221.041633] CPU: 0 UID: 0 PID: 9656 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1221.041657] Tainted: [W]=WARN [ 1221.041663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1221.041673] Call Trace: [ 1221.041678] [ 1221.041685] dump_stack_lvl+0xca/0x120 [ 1221.041721] __lookup_object+0x94/0xb0 [ 1221.041744] delete_object_full+0x27/0x70 [ 1221.041765] free_percpu+0x30/0x1160 [ 1221.041787] ? arch_uprobe_clear_state+0x16/0x140 [ 1221.041814] futex_hash_free+0x38/0xc0 [ 1221.041832] mmput+0x2d3/0x390 [ 1221.041857] do_exit+0x79d/0x2970 [ 1221.041876] ? signal_wake_up_state+0x85/0x120 [ 1221.041897] ? zap_other_threads+0x2b9/0x3a0 [ 1221.041919] ? __pfx_do_exit+0x10/0x10 [ 1221.041936] ? do_group_exit+0x1c3/0x2a0 [ 1221.041955] ? lock_release+0xc8/0x290 [ 1221.041978] do_group_exit+0xd3/0x2a0 [ 1221.041998] __x64_sys_exit_group+0x3e/0x50 [ 1221.042017] x64_sys_call+0x18c5/0x18d0 [ 1221.042038] do_syscall_64+0xbf/0x360 [ 1221.042054] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1221.042069] RIP: 0033:0x7f61678c2b19 [ 1221.042081] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1221.042088] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1221.042104] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1221.042114] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1221.042124] RBP: 0000000000000000 R08: 0000001b2cd2001c R09: 0000000000000000 [ 1221.042134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1221.042144] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1221.042165] [ 1221.042171] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1221.042180] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295887681 [ 1221.042190] kmemleak: min_count = 1 [ 1221.042195] kmemleak: count = 0 [ 1221.042201] kmemleak: flags = 0x21 [ 1221.042206] kmemleak: checksum = 0 [ 1221.042211] kmemleak: backtrace: [ 1221.042215] pcpu_alloc_noprof+0x87a/0x1170 [ 1221.042236] __percpu_counter_init_many+0x44/0x360 [ 1221.042253] mm_init+0xcac/0x1170 [ 1221.042265] copy_process+0x3ab7/0x73c0 [ 1221.042278] kernel_clone+0xea/0x7f0 [ 1221.042292] __do_sys_clone+0xce/0x120 [ 1221.042306] do_syscall_64+0xbf/0x360 [ 1221.042317] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:02:26 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:26 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:26 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:02:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 02:02:26 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:02:37 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:02:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 02:02:37 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:02:37 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:02:37 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:37 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x40000850) 02:02:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:02:37 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1231.682949] vfat: Unknown parameter 'appraise' [ 1231.703041] vfat: Unknown parameter 'appraise' 02:02:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x40000850) 02:02:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, 0x0, 0x0) 02:02:37 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) [ 1231.817430] kmemleak: Found object by alias at 0x607f1a62a61c [ 1231.817465] CPU: 0 UID: 0 PID: 9703 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1231.817498] Tainted: [W]=WARN [ 1231.817505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1231.817517] Call Trace: [ 1231.817524] [ 1231.817532] dump_stack_lvl+0xca/0x120 [ 1231.817572] __lookup_object+0x94/0xb0 [ 1231.817601] delete_object_full+0x27/0x70 [ 1231.817630] free_percpu+0x30/0x1160 [ 1231.817658] ? arch_uprobe_clear_state+0x16/0x140 [ 1231.817693] futex_hash_free+0x38/0xc0 [ 1231.817718] mmput+0x2d3/0x390 02:02:37 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:02:37 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1231.817751] do_exit+0x79d/0x2970 [ 1231.817775] ? lock_release+0xc8/0x290 [ 1231.817805] ? __pfx_do_exit+0x10/0x10 [ 1231.817830] ? find_held_lock+0x2b/0x80 [ 1231.817860] ? get_signal+0x835/0x2340 [ 1231.817896] do_group_exit+0xd3/0x2a0 [ 1231.817923] get_signal+0x2315/0x2340 [ 1231.817964] ? __pfx_get_signal+0x10/0x10 [ 1231.817993] ? do_futex+0x135/0x370 [ 1231.818018] ? __pfx_do_futex+0x10/0x10 [ 1231.818046] arch_do_signal_or_restart+0x80/0x790 [ 1231.818078] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1231.818107] ? __x64_sys_futex+0x1c9/0x4d0 [ 1231.818129] ? __x64_sys_futex+0x1d2/0x4d0 [ 1231.818156] ? __pfx___x64_sys_futex+0x10/0x10 [ 1231.818190] exit_to_user_mode_loop+0x8b/0x110 [ 1231.818213] do_syscall_64+0x2f7/0x360 [ 1231.818235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1231.818256] RIP: 0033:0x7f61678c2b19 [ 1231.818272] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1231.818281] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1231.818302] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1231.818316] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1231.818328] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1231.818341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1231.818354] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1231.818383] [ 1231.818389] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1231.818402] kmemleak: comm "kworker/u9:2", pid 9712, jiffies 4295898583 [ 1231.818414] kmemleak: min_count = 1 [ 1231.818422] kmemleak: count = 0 [ 1231.818428] kmemleak: flags = 0x21 [ 1231.818435] kmemleak: checksum = 0 [ 1231.818442] kmemleak: backtrace: [ 1231.818448] pcpu_alloc_noprof+0x87a/0x1170 [ 1231.818475] __percpu_counter_init_many+0x44/0x360 [ 1231.818498] mm_init+0xcac/0x1170 [ 1231.818512] mm_alloc+0xa0/0xd0 [ 1231.818528] alloc_bprm+0x2e3/0x6e0 [ 1231.818557] kernel_execve+0xb0/0x3d0 [ 1231.818573] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1231.818601] ret_from_fork+0x34b/0x430 [ 1231.818631] ret_from_fork_asm+0x1a/0x30 [ 1231.904338] vfat: Unknown parameter 'appraise' [ 1231.950486] vfat: Unknown parameter 'appraise' [ 1231.952948] vfat: Unknown parameter 'appraise' 02:02:37 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:02:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:02:37 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 1232.099495] kmemleak: Found object by alias at 0x607f1a62a61c [ 1232.099521] CPU: 1 UID: 0 PID: 9729 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1232.099554] Tainted: [W]=WARN [ 1232.099561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.099574] Call Trace: [ 1232.099581] [ 1232.099589] dump_stack_lvl+0xca/0x120 [ 1232.099628] __lookup_object+0x94/0xb0 [ 1232.099657] delete_object_full+0x27/0x70 [ 1232.099686] free_percpu+0x30/0x1160 [ 1232.099714] ? arch_uprobe_clear_state+0x16/0x140 [ 1232.099750] futex_hash_free+0x38/0xc0 [ 1232.099774] mmput+0x2d3/0x390 [ 1232.099808] do_exit+0x79d/0x2970 [ 1232.099832] ? lock_release+0xc8/0x290 [ 1232.099861] ? __pfx_do_exit+0x10/0x10 [ 1232.099887] ? find_held_lock+0x2b/0x80 [ 1232.099918] ? get_signal+0x835/0x2340 [ 1232.099953] do_group_exit+0xd3/0x2a0 [ 1232.099981] get_signal+0x2315/0x2340 [ 1232.100022] ? __pfx_get_signal+0x10/0x10 [ 1232.100051] ? do_futex+0x135/0x370 [ 1232.100076] ? __pfx_do_futex+0x10/0x10 [ 1232.100104] arch_do_signal_or_restart+0x80/0x790 [ 1232.100135] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1232.100164] ? __x64_sys_futex+0x1c9/0x4d0 [ 1232.100186] ? __x64_sys_futex+0x1d2/0x4d0 [ 1232.100214] ? __pfx___x64_sys_futex+0x10/0x10 [ 1232.100239] ? xfd_validate_state+0x55/0x180 [ 1232.100277] exit_to_user_mode_loop+0x8b/0x110 [ 1232.100300] do_syscall_64+0x2f7/0x360 [ 1232.100321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1232.100343] RIP: 0033:0x7f61678c2b19 [ 1232.100359] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1232.100368] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1232.100388] RAX: fffffffffffffe00 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1232.100402] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f61679d5f68 [ 1232.100415] RBP: 00007f61679d5f60 R08: 0000000000000000 R09: 0000000000000000 [ 1232.100428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61679d5f6c [ 1232.100447] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1232.100476] [ 1232.100483] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1232.100495] kmemleak: comm "syz-executor.4", pid 287, jiffies 4295898773 [ 1232.100508] kmemleak: min_count = 1 [ 1232.100515] kmemleak: count = 0 [ 1232.100522] kmemleak: flags = 0x21 [ 1232.100529] kmemleak: checksum = 0 [ 1232.100536] kmemleak: backtrace: [ 1232.100542] pcpu_alloc_noprof+0x87a/0x1170 [ 1232.100569] __percpu_counter_init_many+0x44/0x360 [ 1232.100592] mm_init+0xcac/0x1170 [ 1232.100606] copy_process+0x3ab7/0x73c0 [ 1232.100625] kernel_clone+0xea/0x7f0 [ 1232.100642] __do_sys_clone+0xce/0x120 [ 1232.100661] do_syscall_64+0xbf/0x360 [ 1232.100676] entry_SYSCALL_64_after_hwframe+0x77/0x7f 02:02:45 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) 02:02:45 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:02:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:45 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:02:45 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:02:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:02:45 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 02:02:45 executing program 3: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) [ 1239.847972] vfat: Unknown parameter 'appraise' 02:02:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) [ 1239.910039] vfat: Unknown parameter 'appraise' 02:02:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1239.919652] vfat: Unknown parameter 'appraise' [ 1239.933988] vfat: Unknown parameter 'appraise' [ 1239.964924] kmemleak: Found object by alias at 0x607f1a62a61c [ 1239.964941] CPU: 0 UID: 0 PID: 9746 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1239.964959] Tainted: [W]=WARN 02:02:45 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1239.964963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1239.964970] Call Trace: [ 1239.964975] [ 1239.964979] dump_stack_lvl+0xca/0x120 [ 1239.965003] __lookup_object+0x94/0xb0 [ 1239.965020] delete_object_full+0x27/0x70 [ 1239.965036] free_percpu+0x30/0x1160 [ 1239.965052] ? arch_uprobe_clear_state+0x16/0x140 [ 1239.965073] futex_hash_free+0x38/0xc0 [ 1239.965087] mmput+0x2d3/0x390 [ 1239.965106] do_exit+0x79d/0x2970 [ 1239.965120] ? signal_wake_up_state+0x85/0x120 [ 1239.965136] ? zap_other_threads+0x2b9/0x3a0 [ 1239.965152] ? __pfx_do_exit+0x10/0x10 [ 1239.965164] ? do_group_exit+0x1c3/0x2a0 [ 1239.965178] ? lock_release+0xc8/0x290 [ 1239.965195] do_group_exit+0xd3/0x2a0 [ 1239.965210] __x64_sys_exit_group+0x3e/0x50 [ 1239.965224] x64_sys_call+0x18c5/0x18d0 [ 1239.965239] do_syscall_64+0xbf/0x360 [ 1239.965251] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1239.965262] RIP: 0033:0x7f61678c2b19 [ 1239.965271] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1239.965276] RSP: 002b:00007ffe2a156188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1239.965288] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f61678c2b19 [ 1239.965296] RDX: 00007f616787572b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1239.965303] RBP: 0000000000000000 R08: 0000001b2cd2045c R09: 0000000000000000 [ 1239.965310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1239.965317] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe2a156270 [ 1239.965333] [ 1239.965336] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1239.965343] kmemleak: comm "kworker/u9:0", pid 9758, jiffies 4295906742 [ 1239.965350] kmemleak: min_count = 1 [ 1239.965354] kmemleak: count = 0 [ 1239.965358] kmemleak: flags = 0x21 [ 1239.965361] kmemleak: checksum = 0 [ 1239.965365] kmemleak: backtrace: [ 1239.965369] pcpu_alloc_noprof+0x87a/0x1170 [ 1239.965384] __percpu_counter_init_many+0x44/0x360 [ 1239.965397] mm_init+0xcac/0x1170 [ 1239.965405] mm_alloc+0xa0/0xd0 [ 1239.965414] alloc_bprm+0x2e3/0x6e0 [ 1239.965435] kernel_execve+0xb0/0x3d0 [ 1239.965444] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1239.965460] ret_from_fork+0x34b/0x430 [ 1239.965478] ret_from_fork_asm+0x1a/0x30 [ 1239.996701] kmemleak: Found object by alias at 0x607f1a62a618 [ 1239.996714] CPU: 0 UID: 0 PID: 9744 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1239.996732] Tainted: [W]=WARN [ 1239.996735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1239.996742] Call Trace: [ 1239.996745] [ 1239.996750] dump_stack_lvl+0xca/0x120 [ 1239.996769] __lookup_object+0x94/0xb0 [ 1239.996784] delete_object_full+0x27/0x70 [ 1239.996800] free_percpu+0x30/0x1160 [ 1239.996815] ? arch_uprobe_clear_state+0x16/0x140 [ 1239.996834] futex_hash_free+0x38/0xc0 [ 1239.996847] mmput+0x2d3/0x390 [ 1239.996865] do_exit+0x79d/0x2970 [ 1239.996878] ? signal_wake_up_state+0x85/0x120 [ 1239.996893] ? zap_other_threads+0x2b9/0x3a0 [ 1239.996908] ? __pfx_do_exit+0x10/0x10 [ 1239.996920] ? do_group_exit+0x1c3/0x2a0 [ 1239.996934] ? lock_release+0xc8/0x290 [ 1239.996950] do_group_exit+0xd3/0x2a0 [ 1239.996964] __x64_sys_exit_group+0x3e/0x50 [ 1239.996978] x64_sys_call+0x18c5/0x18d0 [ 1239.996992] do_syscall_64+0xbf/0x360 [ 1239.997003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1239.997014] RIP: 0033:0x7ff07166db19 [ 1239.997022] Code: Unable to access opcode bytes at 0x7ff07166daef. [ 1239.997028] RSP: 002b:00007ffdf74fc448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1239.997038] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007ff07166db19 [ 1239.997045] RDX: 00007ff07162072b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 1239.997052] RBP: 0000000000000000 R08: 0000001b2cf23be8 R09: 0000000000000000 [ 1239.997059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1239.997065] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffdf74fc530 [ 1239.997081] [ 1239.997084] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1239.997091] kmemleak: comm "kworker/u9:0", pid 9758, jiffies 4295906742 [ 1239.997097] kmemleak: min_count = 1 [ 1239.997101] kmemleak: count = 0 [ 1239.997105] kmemleak: flags = 0x21 [ 1239.997109] kmemleak: checksum = 0 [ 1239.997112] kmemleak: backtrace: [ 1239.997115] pcpu_alloc_noprof+0x87a/0x1170 [ 1239.997130] __percpu_counter_init_many+0x44/0x360 [ 1239.997141] mm_init+0xcac/0x1170 [ 1239.997149] mm_alloc+0xa0/0xd0 [ 1239.997157] alloc_bprm+0x2e3/0x6e0 [ 1239.997173] kernel_execve+0xb0/0x3d0 [ 1239.997181] call_usermodehelper_exec_async+0x25f/0x4e0 [ 1239.997196] ret_from_fork+0x34b/0x430 [ 1239.997211] ret_from_fork_asm+0x1a/0x30 02:02:45 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:45 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:02:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:02:45 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) 02:02:45 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) [ 1240.065329] vfat: Unknown parameter 'appraise' 02:02:45 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1240.117910] vfat: Unknown parameter 'appraise' [ 1240.146113] vfat: Unknown parameter 'appraise' [ 1240.152302] kmemleak: Found object by alias at 0x607f1a62a61c [ 1240.152316] CPU: 0 UID: 0 PID: 9765 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1240.152334] Tainted: [W]=WARN [ 1240.152338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1240.152345] Call Trace: [ 1240.152349] [ 1240.152353] dump_stack_lvl+0xca/0x120 [ 1240.152377] __lookup_object+0x94/0xb0 [ 1240.152394] delete_object_full+0x27/0x70 [ 1240.152410] free_percpu+0x30/0x1160 [ 1240.152426] ? arch_uprobe_clear_state+0x16/0x140 [ 1240.152450] futex_hash_free+0x38/0xc0 [ 1240.152464] mmput+0x2d3/0x390 [ 1240.152483] do_exit+0x79d/0x2970 [ 1240.152500] ? __pfx_do_exit+0x10/0x10 [ 1240.152515] ? find_held_lock+0x2b/0x80 [ 1240.152533] ? get_signal+0x835/0x2340 [ 1240.152553] do_group_exit+0xd3/0x2a0 [ 1240.152568] get_signal+0x2315/0x2340 [ 1240.152585] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1240.152603] ? __pfx_get_signal+0x10/0x10 [ 1240.152619] ? __schedule+0xe91/0x3590 [ 1240.152639] arch_do_signal_or_restart+0x80/0x790 [ 1240.152656] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1240.152673] ? __x64_sys_futex+0x1c9/0x4d0 [ 1240.152685] ? __x64_sys_futex+0x1d2/0x4d0 [ 1240.152699] ? __x64_sys_openat+0x142/0x200 [ 1240.152716] ? __pfx___x64_sys_futex+0x10/0x10 [ 1240.152734] exit_to_user_mode_loop+0x8b/0x110 [ 1240.152747] do_syscall_64+0x2f7/0x360 [ 1240.152759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1240.152771] RIP: 0033:0x7f61678c2b19 [ 1240.152780] Code: Unable to access opcode bytes at 0x7f61678c2aef. [ 1240.152785] RSP: 002b:00007f6164e38218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1240.152796] RAX: 0000000000000001 RBX: 00007f61679d5f68 RCX: 00007f61678c2b19 [ 1240.152804] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f61679d5f6c [ 1240.152811] RBP: 00007f61679d5f60 R08: 000000000000000e R09: 0000000000000000 [ 1240.152818] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f61679d5f6c [ 1240.152825] R13: 00007ffe2a155f5f R14: 00007f6164e38300 R15: 0000000000022000 [ 1240.152840] [ 1240.152844] kmemleak: Object (percpu) 0x607f1a62a610 (size 16): [ 1240.152851] kmemleak: comm "syz-executor.1", pid 280, jiffies 4295906836 [ 1240.152857] kmemleak: min_count = 1 [ 1240.152861] kmemleak: count = 0 [ 1240.152865] kmemleak: flags = 0x21 [ 1240.152869] kmemleak: checksum = 0 [ 1240.152872] kmemleak: backtrace: [ 1240.152876] pcpu_alloc_noprof+0x87a/0x1170 [ 1240.152891] __percpu_counter_init_many+0x44/0x360 [ 1240.152904] mm_init+0xcac/0x1170 [ 1240.152912] copy_process+0x3ab7/0x73c0 [ 1240.152921] kernel_clone+0xea/0x7f0 [ 1240.152931] __do_sys_clone+0xce/0x120 [ 1240.152941] do_syscall_64+0xbf/0x360 [ 1240.152950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1240.180818] vfat: Unknown parameter 'appraise' [ 1240.187327] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1240.204324] FAT-fs (loop7): unable to read boot sector 02:02:54 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:54 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:54 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}]}) 02:02:54 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:02:54 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:02:54 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001d40)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40010001}, 0x4) 02:02:54 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:02:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1248.755419] No source specified [ 1248.780176] vfat: Unknown parameter 'appraise' [ 1248.788947] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 02:02:54 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1248.794680] FAT-fs (loop7): unable to read boot sector 02:02:54 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:02:54 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:54 executing program 5: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:02:54 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:02:54 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) [ 1248.976958] vfat: Unknown parameter 'appraise' [ 1248.989264] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1248.991691] FAT-fs (loop7): unable to read boot sector 02:03:03 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:03:03 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:03:03 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:03:03 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 02:03:03 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001bc0), r3) 02:03:03 executing program 5: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:03:03 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1258.056015] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1258.057360] FAT-fs (loop7): unable to read boot sector [ 1258.085391] vfat: Unknown parameter 'appraise' 02:03:03 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0xa00, 0x0) 02:03:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:03 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:03 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}]}) 02:03:03 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:03:03 executing program 1: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, 0x0) 02:03:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:03 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) [ 1258.378310] vfat: Unknown parameter 'appraise' [ 1258.422190] vfat: Unknown parameter 'appraise' 02:03:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:13 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:13 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:03:13 executing program 5: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:03:13 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) 02:03:13 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}]}) 02:03:13 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 02:03:13 executing program 1: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1268.328335] vfat: Unknown parameter 'appraise' 02:03:13 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}], [{@appraise}]}) [ 1268.401350] vfat: Unknown parameter 'appraise' 02:03:13 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0xa00, 0x0) 02:03:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x34, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1268.475761] vfat: Unknown parameter 'appraise' 02:03:13 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[], [{@appraise}]}) 02:03:14 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:14 executing program 2: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@shortname_winnt}]}) 02:03:14 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2ec, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xf4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xee, 0x3, "5910f951a8e21b427ef885926532d3f633a678567fa26b0793be5e7e0dd09b94121ae15a6c236721329d1751bd6abde8af3caf4acb77c6fd7b42930f36088c8f7e038d102ab35616bc94df402fac2c1f75baa95af24af4a57cb34bb5f7278bf73ed0d2651c3169cac84b0f99575b2f846ae04ffb4efe0144edec39de72fa0218601fab86ca91b6e18c419f0d8e537509264f0d9ef228febeae1860ddc7dac63454b9380bc0cd6f23646e1c66d4b083219d32a37f8323de6c11052b60df57775d3331304841686b4685c60f7d5e509c1ea91b61d30cc32ee847df3bcf0ff26fd8bb71aa6cdf56d3fc979f"}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "67e9996a2dad007bde54aa0513a921ac78c063205679cb4a4c"}}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "fb4f9cae9a5fc50c9d4d5de121449b6248b9dc0260537369105e359170cf"}}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x288621cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x2ec}}, 0x80) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) 02:03:14 executing program 5: r0 = socket(0x15, 0x6, 0x7c8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x100, 0x8, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x8835) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1268.641302] vfat: Unknown parameter 'appraise' [ 1268.653040] No source specified 02:03:22 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000700)='./file0\x00', 0x39, 0x2, &(0x7f0000000800)=[{&(0x7f0000000740)="d0ceab33695031d7c3ef87d9ead42b0d385a8297b0a211bdfa108d43a3fe38c0a95fb29d6183f047f7e4e86b8da7075a9e", 0x31, 0x6}, {&(0x7f0000000780)="d470bd8e16a341fda1ea38f1608a6c782ca25abcc5d0cd414fa0821c2ab5887c913a9675a0e951056795e896e5aca509ac06543f1db24eac7ff4a0099f79bc92a811d18c1d8bfb6a3096b5ad5fb21c0ebeb824ce14bcdaf96db5e0d014ad7527ced8138238d24095", 0x68, 0x23}], 0x3800020, &(0x7f0000000840)={[{@shortname_winnt}, {@shortname_win95}], [{@appraise}, {@fsname={'fsname', 0x3d, 'ib\x00'}}, {@smackfshat={'smackfshat', 0x3d, '\x9f$[-{]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#^&*'}}]}) lsetxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001300)={{}, {}, [{0x2, 0x1, 0xee00}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee01}, {0x2, 0xd, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0xd}, {0x2, 0x7}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x1}], {0x10, 0x4}}, 0x7c, 0x0) 02:03:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:22 executing program 2: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 02:03:22 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0x0, 0x0) 02:03:22 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) 02:03:22 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 02:03:22 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:22 executing program 6: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)={[{@shortname_winnt}]}) [ 1276.851988] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI [ 1276.853675] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1276.854774] CPU: 1 UID: 0 PID: 9936 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1276.856545] Tainted: [W]=WARN [ 1276.857028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.858266] RIP: 0010:__queue_work+0x202/0x1240 [ 1276.858988] Code: 48 8b 6d 00 e8 4f 9e 79 03 31 ff 41 89 c5 89 c6 e8 93 f3 31 00 45 85 ed 0f 85 e1 05 00 00 e8 55 f8 31 00 48 89 e8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 a0 0e 00 00 4c 8b 75 00 48 89 df 4c 89 34 24 [ 1276.861665] RSP: 0018:ffff88803cbef3f0 EFLAGS: 00010056 [ 1276.862454] RAX: 0000000000000000 RBX: ffff88800e2e9118 RCX: ffffc9000aadf000 [ 1276.863525] RDX: 0000000000040000 RSI: ffffffff8141ef2b RDI: 0000000000000005 [ 1276.864570] RBP: 0000000000000001 R08: 0000000000000001 R09: fffffbfff0f11ef4 [ 1276.865639] R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 [ 1276.866692] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8880140c0000 [ 1276.873330] FS: 00007fda74035700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 [ 1276.874488] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1276.875341] CR2: 00007f13a1559260 CR3: 000000001dcc8000 CR4: 0000000000350ef0 [ 1276.876363] Call Trace: [ 1276.876739] [ 1276.877074] ? find_held_lock+0x2b/0x80 [ 1276.877668] queue_work_on+0xd0/0xe0 [ 1276.878219] loop_queue_rq+0x5c8/0x1180 [ 1276.878805] __blk_mq_issue_directly+0xd5/0x260 [ 1276.879503] ? __pfx___blk_mq_issue_directly+0x10/0x10 [ 1276.880269] ? bdev_count_inflight_rw.part.0+0x5f/0x380 [ 1276.881041] blk_mq_request_issue_directly+0x11c/0x1e0 [ 1276.881798] blk_mq_issue_direct+0x192/0x640 [ 1276.882445] blk_mq_dispatch_queue_requests+0x4b0/0x7c0 [ 1276.883216] blk_mq_flush_plug_list+0x1ec/0x5b0 [ 1276.883913] ? read_tsc+0x9/0x20 [ 1276.884419] ? ktime_get+0x16d/0x270 [ 1276.884969] ? trace_block_plug+0x149/0x1b0 [ 1276.885600] ? blk_add_rq_to_plug+0x234/0x550 [ 1276.886262] ? __pfx_blk_mq_flush_plug_list+0x10/0x10 [ 1276.887006] ? blk_mq_submit_bio+0x4fd/0x2220 [ 1276.887673] __blk_flush_plug+0x25c/0x460 [ 1276.888276] ? __pfx___blk_flush_plug+0x10/0x10 [ 1276.888959] __submit_bio+0x480/0x5b0 [ 1276.889513] ? __pfx___submit_bio+0x10/0x10 [ 1276.890140] ? read_tsc+0x9/0x20 [ 1276.890642] ? ktime_get+0x16d/0x270 [ 1276.891191] submit_bio_noacct_nocheck+0x68e/0xcb0 [ 1276.891909] ? __pfx_submit_bio_noacct_nocheck+0x10/0x10 [ 1276.892691] submit_bio_noacct+0x359/0x1350 [ 1276.893315] __bread_gfp+0x18b/0x3c0 [ 1276.893864] fat_fill_super+0x5e1/0x3fd0 [ 1276.894474] ? __pfx_setup+0x10/0x10 [ 1276.895019] ? __pfx_fat_fill_super+0x10/0x10 [ 1276.895693] ? snprintf+0xbe/0x100 [ 1276.896237] ? __pfx_snprintf+0x10/0x10 [ 1276.896829] ? find_held_lock+0x2b/0x80 [ 1276.897424] ? setup_bdev_super+0x2ed/0x6e0 [ 1276.898058] ? set_blocksize+0x1b4/0x470 [ 1276.898646] ? lock_release+0xc8/0x290 [ 1276.899220] ? sb_set_blocksize+0x177/0x1c0 [ 1276.899850] ? setup_bdev_super+0x31f/0x6e0 [ 1276.900488] get_tree_bdev_flags+0x38a/0x620 [ 1276.901129] ? __pfx_vfat_fill_super+0x10/0x10 [ 1276.901796] ? __pfx_get_tree_bdev_flags+0x10/0x10 [ 1276.902510] ? cap_capable+0xdb/0x3b0 [ 1276.903092] ? security_capable+0x2f/0x90 [ 1276.903714] vfs_get_tree+0x93/0x340 [ 1276.904276] path_mount+0x132d/0x1dd0 [ 1276.904835] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1276.905600] ? __pfx_path_mount+0x10/0x10 [ 1276.906203] ? kmem_cache_free+0x2a1/0x540 [ 1276.906824] ? putname.part.0+0x11b/0x160 [ 1276.907440] ? getname_flags.part.0+0x1c6/0x540 [ 1276.908126] ? putname.part.0+0x11b/0x160 [ 1276.908734] __x64_sys_mount+0x27b/0x300 [ 1276.909331] ? __pfx___x64_sys_mount+0x10/0x10 [ 1276.910002] do_syscall_64+0xbf/0x360 [ 1276.910557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1276.911316] RIP: 0033:0x7fda76ac104a [ 1276.911857] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.914431] RSP: 002b:00007fda74034fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1276.915532] RAX: ffffffffffffffda RBX: 0000000020000800 RCX: 00007fda76ac104a [ 1276.916552] RDX: 00000000200006c0 RSI: 0000000020000700 RDI: 00007fda74035000 [ 1276.917567] RBP: 00007fda74035040 R08: 00007fda74035040 R09: 00000000200006c0 [ 1276.918578] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200006c0 [ 1276.919599] R13: 0000000020000700 R14: 00007fda74035000 R15: 0000000020000840 [ 1276.920618] [ 1276.920962] Modules linked in: [ 1276.921436] ---[ end trace 0000000000000000 ]--- [ 1276.922115] RIP: 0010:__queue_work+0x202/0x1240 [ 1276.922802] Code: 48 8b 6d 00 e8 4f 9e 79 03 31 ff 41 89 c5 89 c6 e8 93 f3 31 00 45 85 ed 0f 85 e1 05 00 00 e8 55 f8 31 00 48 89 e8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 a0 0e 00 00 4c 8b 75 00 48 89 df 4c 89 34 24 [ 1276.925397] RSP: 0018:ffff88803cbef3f0 EFLAGS: 00010056 [ 1276.926161] RAX: 0000000000000000 RBX: ffff88800e2e9118 RCX: ffffc9000aadf000 [ 1276.927177] RDX: 0000000000040000 RSI: ffffffff8141ef2b RDI: 0000000000000005 [ 1276.928199] RBP: 0000000000000001 R08: 0000000000000001 R09: fffffbfff0f11ef4 [ 1276.929223] R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 [ 1276.930234] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8880140c0000 [ 1276.931253] FS: 00007fda74035700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 [ 1276.932426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1276.933261] CR2: 00007f13a1559260 CR3: 000000001dcc8000 CR4: 0000000000350ef0 [ 1276.934295] note: syz-executor.6[9936] exited with irqs disabled [ 1276.936368] note: syz-executor.6[9936] exited with preempt_count 1 [ 1276.938146] ------------[ cut here ]------------ [ 1276.938870] WARNING: kernel/exit.c:898 at do_exit+0x1c36/0x2970, CPU#1: syz-executor.6/9936 [ 1276.940124] Modules linked in: [ 1276.940635] CPU: 1 UID: 0 PID: 9936 Comm: syz-executor.6 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1276.942361] Tainted: [D]=DIE, [W]=WARN [ 1276.942944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.944166] RIP: 0010:do_exit+0x1c36/0x2970 [ 1276.944831] Code: 96 0a 00 00 c7 43 18 00 00 00 00 e9 21 e6 ff ff e8 bf a4 38 00 bf 02 24 00 00 e8 f5 ab 0b 00 e9 41 ff ff ff e8 ab a4 38 00 90 <0f> 0b 90 e9 87 e4 ff ff e8 9d a4 38 00 4c 89 e6 bf 05 06 00 00 e8 [ 1276.947469] RSP: 0018:ffff88803cbefe40 EFLAGS: 00010216 [ 1276.948240] RAX: 000000000003b3ee RBX: 0000000000000200 RCX: ffffc9000aadf000 [ 1276.949285] RDX: 0000000000040000 RSI: ffffffff813b42d5 RDI: ffff888015d8ad68 [ 1276.950338] RBP: ffff888015d89b80 R08: 0000000000000001 R09: fffffbfff0f11cd8 [ 1276.951400] R10: 0000000000000200 R11: 0000000000000001 R12: 000000000000000b [ 1276.952457] R13: 0000000000002710 R14: dffffc0000000000 R15: 0000000000000000 [ 1276.953515] FS: 00007fda74035700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 [ 1276.954702] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1276.955587] CR2: 00007f13a1559260 CR3: 000000001dcc8000 CR4: 0000000000350ef0 [ 1276.956648] Call Trace: [ 1276.957032] [ 1276.957370] ? _printk+0xbe/0xf0 [ 1276.957911] ? __pfx__printk+0x10/0x10 [ 1276.958517] ? __pfx_do_exit+0x10/0x10 [ 1276.959097] make_task_dead+0x174/0x3b0 [ 1276.959731] ? do_syscall_64+0xbf/0x360 [ 1276.960316] rewind_stack_and_make_dead+0x16/0x20 [ 1276.961054] RIP: 0033:0x7fda76ac104a [ 1276.961624] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.964268] RSP: 002b:00007fda74034fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1276.965391] RAX: ffffffffffffffda RBX: 0000000020000800 RCX: 00007fda76ac104a [ 1276.966463] RDX: 00000000200006c0 RSI: 0000000020000700 RDI: 00007fda74035000 [ 1276.967522] RBP: 00007fda74035040 R08: 00007fda74035040 R09: 00000000200006c0 [ 1276.968579] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200006c0 [ 1276.969633] R13: 0000000020000700 R14: 00007fda74035000 R15: 0000000020000840 [ 1276.970709] [ 1276.971065] irq event stamp: 754 [ 1276.971593] hardirqs last enabled at (753): [] _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1276.972989] hardirqs last disabled at (754): [] _raw_spin_lock_irq+0x42/0x50 [ 1276.974279] softirqs last enabled at (724): [] handle_softirqs+0x50c/0x770 [ 1276.975565] softirqs last disabled at (715): [] __irq_exit_rcu+0xc4/0x100 [ 1276.976816] ---[ end trace 0000000000000000 ]--- [ 1276.977531] BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:51 [ 1276.978855] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 9936, name: syz-executor.6 [ 1276.980145] preempt_count: 0, expected: 0 02:03:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) [ 1276.980791] RCU nest depth: 2, expected: 0 [ 1276.981648] INFO: lockdep is turned off. [ 1276.982355] CPU: 1 UID: 0 PID: 9936 Comm: syz-executor.6 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 1276.982391] Tainted: [D]=DIE, [W]=WARN [ 1276.982398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.982410] Call Trace: [ 1276.982417] [ 1276.982424] dump_stack_lvl+0xfa/0x120 [ 1276.982466] __might_resched+0x2f3/0x510 [ 1276.982490] exit_signals+0x25/0x940 [ 1276.982523] do_exit+0x2db/0x2970 [ 1276.982547] ? _printk+0xbe/0xf0 [ 1276.982569] ? __pfx__printk+0x10/0x10 [ 1276.982593] ? __pfx_do_exit+0x10/0x10 [ 1276.982620] make_task_dead+0x174/0x3b0 [ 1276.982644] ? do_syscall_64+0xbf/0x360 [ 1276.982663] rewind_stack_and_make_dead+0x16/0x20 [ 1276.982691] RIP: 0033:0x7fda76ac104a [ 1276.982706] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.982727] RSP: 002b:00007fda74034fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1276.982747] RAX: ffffffffffffffda RBX: 0000000020000800 RCX: 00007fda76ac104a [ 1276.982762] RDX: 00000000200006c0 RSI: 0000000020000700 RDI: 00007fda74035000 [ 1276.982775] RBP: 00007fda74035040 R08: 00007fda74035040 R09: 00000000200006c0 [ 1276.982789] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200006c0 [ 1276.982802] R13: 0000000020000700 R14: 00007fda74035000 R15: 0000000020000840 [ 1276.982822] 02:03:22 executing program 7: syz_mount_image$vfat(&(0x7f00000006c0), 0x0, 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)) 02:03:22 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000f80), 0x0, 0x0) 02:03:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cc}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000880}, 0x40000850) 02:03:22 executing program 2: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) 02:03:22 executing program 1: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_IE={0x6a, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x3}, @measure_req={0x26, 0x5e, {0x1, 0x5, 0x2, "708e9b20dd5e156fe5dade243e3a15c1dfdc58c34380075dd2b57c0419cbfd1aa2950384cfe322ae3da58aa2f62b4310ea3db5a2a8126846435cb14663be3b46c0e97acad310ae42711b988a8b0b09cb63179c6513e757b99eb8da"}}, @dsss={0x3, 0x1, 0xa1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x80c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000200)=0xfffff3a7, &(0x7f0000000240)=0x4) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc414}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bd61efe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000050}, 0x804) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000004c0)=0x1, &(0x7f0000000500)=0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001900)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) [ 1286.375483] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) VM DIAGNOSIS: 02:03:22 Registers: info registers vcpu 0 RAX=000003401d81f26c RBX=0000000000000000 RCX=00000000000006e0 RDX=0000000000000340 RSI=ffff88806ce238c0 RDI=0000000000050f24 RBP=ffff88806ce238c0 RSP=ffff88806ce08ed8 R8 =0000000000000001 R9 =0000000000000000 R10=00000000000e7b5d R11=ffff88806ce37018 R12=0000000000050f24 R13=0000000000000000 R14=0000000000000000 R15=ffff88806ce28080 RIP=ffffffff81327f55 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555570046400 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe1600000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fe402ea6f64 CR3=000000003a6af000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=0000ff000000ff0000000000000000ff XMM02=7463656a6e695f31313230385f7a7973 XMM03=00000000000000000000000000000000 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000000d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff828e32c5 RDI=ffffffff88724180 RBP=ffffffff88724140 RSP=ffff88803cbeed60 R8 =0000000000000000 R9 =ffffed1001490046 R10=0000000000000000 R11=3030303030302052 R12=000000000000000d R13=0000000000000010 R14=ffffffff88724140 R15=ffffffff828e32b0 RIP=ffffffff828e331d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fda74035700 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe2c00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f13a1559260 CR3=000000001dcc8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000000000000000ffff000000000000 XMM01=6f6b636f7374656700004c4556454c5f XMM02=00000000000000000001000000000000 XMM03=463bbe6346b15c43466812a8a2b53dea XMM04=dab89eb957e713659c1763cb090b8b8a XMM05=981b7142ae10d3ca7ae9c0463bbe6346 XMM06=b15c43466812a8a2b53dea10432bf6a2 XMM07=8aa53dae22e3cf840395a21afdcb1904 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000